Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

104results about How to "Fix technical issues with less security" patented technology

Data encryption method, apparatus and system

The invention discloses a data encryption method, apparatus and system. The data encryption method includes the steps: sending one or more first data to a first reception end, wherein the first data at least includes a first randomized number which is encrypted through an asymmetric algorithm; receiving one or more second data returned from the first reception end, wherein the second data at least includes a second randomized number which is encrypted through an asymmetric algorithm; and according to the first randomized number and the second randomized number, forming a secret key. The data encryption method, apparatus and system can solve the technical problem that in the prior art, industrial switches and energy control equipment transmit data through a plaintext transmission mode, so that safety is lower.
Owner:北京德威特电气科技股份有限公司

Business encryption/decryption method and device

The invention discloses a business encryption / decryption method and a device. The method comprises steps that an encryption request sent by a business module is received by a secret key agent module, and the encryption request contains the to-be-encrypted data; a target secret key is acquired from a secret key list by the secret key agent module, and the secret key list is acquired from a secret key server in advance; the to-be-encrypted data is encrypted by the secret key agent module through utilizing the target secret key to acquire the encrypted data; the encrypted data is sent by the secret key agent module to the business module. Through the method, a technical problem of relatively low security of secret keys during business encryption in the prior art is solved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Data processing method used for electronic election

The invention discloses a data processing method used for electronic election. The method includes the following steps: a voting terminal encrypts electronic votes of voters into encrypted votes through an election encryption public key, and packs the encrypted votes into a vote data packet; the vote data packet attached with identification information is encrypted into an encrypted data packet through the election encryption public key, and the encrypted data packet signed by a terminal with a private key signature is sent to an election server; the election server judges the validity of the encrypted data packet through the identification information, verifies signature information of the encrypted data packet, and then stores in a vote database; and after at least two rounds of mixing operation is executed on the encrypted votes in the vote database, vote statistics are conducted, and the mixing operation includes performing re-encryption on each encrypted vote according to a preset encryption algorithm, and after re-encryption, executing disorder operation on each encrypted vote according to a preset disorder algorithm. The data processing method used for electronic election solves the technical problem in related technologies that the security is relatively low when on-site voting is performed.
Owner:JINHUA HONGZHENG TECH CO LTD

Method and device for detecting malicious script file

The application of the invention discloses a method and device for detecting a malicious script file. The method comprises the following steps: in the process of executing the acquired script file to be detected, monitoring the invoked function to be detected when running the script file to be detected; judging whether an input parameter of the function to be detected is included in a pre-generated filling parameter data set, wherein the filling parameter data set includes filling parameters for page interaction, the filling parameters are generated based on a pre-hooked default function and a default interpretation engine, the default function is used for inputting the filling parameters, and the default interpretation engine is used for detecting whether the filling parameters need to be input; if the input parameters are included in the filling parameter data set, determining that the script file to be detected is the malicious script file. The application of the invention solves the technical problem of low security of a web server caused by the situation that the malicious script file detection method based on static feature extraction easily fails to report a hidden malicious script file.
Owner:ALIBABA GRP HLDG LTD

Log encryption method and device and log decryption method and device

The embodiment of the invention provides a log encryption method and device and a log decryption method and device. The encryption method comprises the following steps: encrypting; client startup, generating a first private key based on the random function, generating a first public key paired with the first private key based on an asymmetric encryption algorithm, generating a first shared key according to an asymmetric encryption algorithm, the first private key and the second public key; and encrypting the original log content based on the first shared key and a preset encryption algorithm to obtain encrypted log content, writing the encrypted log content and the first public key into a log file, and sending the log file to the server, so that the server generates a second shared key based on the first public key, and decrypts the original log content based on the second shared key to obtain the original log content. The first shared key and the second shared key are changeable, so that the protection degree of the log file can be improved, and the safety is improved.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Block chain access authentication method and device, storage medium and electronic device

The invention discloses a block chain access authentication method and device, a storage medium and an electronic device. The method comprises the following steps: the control center acquires an access request sent by the first account for requesting to access the block chain data, verifies a user certificate carried in the access request, obtains the position of the authority information of the first account in the block chain from an index system, and sends the position of the permission information in the block chain to the permission management smart contract, the permission management smart contract reads permission information of the first account at the position of the permission information in the block chain, and authenticates a first function to be accessed by the first account by using the permission information, sends an obtained authentication result to the control center, and allows the first account to access the first function by the control center according to the authentication result or refuses the first account to access the first function by the control center according to the authentication result. According to the method and the apparatus, the technical problem of relatively low security of permission data in related technologies is solved.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Method and device for logging using password key, storage medium and processor

The invention discloses a method and a device for logging using a password key, a storage medium and a processor. The method comprises the following steps: obtaining identification information and current position information of a current terminal when logging in with a password key, wherein the current terminal is a terminal using the password key, and the current position information is positioninformation of the current terminal; , and allowing the login operation to be performed using the password key when the identification information of the current terminal coincides with the identification information of the authorized terminal recorded in the password key and the current position information coincides with the initial position information at the time of first login using the password key, wherein the authorized terminal is a terminal permitting the use of the password key. The invention solves the technical problem that the use range of the password key is not limited by therelated technology, and the information security is low.
Owner:BEIJING HAITAI FANGYUAN HIGH TECH

Transaction proposal processing method, device and system, storage medium and electronic device

The invention relates to a transaction proposal processing method, device and system, a storage medium and an electronic device. The method comprises the steps: obtaining target transaction information of a client; signing the target transaction information by using a client private key of the client to obtain first signature information; sending an initial transaction proposal carrying the targettransaction information and the first signature information to the blockchain node, wherein the initial transaction proposal is used for indicating the blockchain node to obtain a target transactionproposal carrying target transaction information, first signature information and second signature information, and the second signature information is obtained by signing the target transaction information by the blockchain node. According to the application, the technical problem that the verification process of the transaction proposal is relatively low in safety in related technologies is solved.
Owner:BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD

Human body infrared sensor based smart home control center equipment

The invention provides human body infrared sensor based smart home control center equipment. The smart home control center equipment is connected with N smart home devices, and the control center equipment comprises a human body infrared sensor, an image analysis device and a smart home control device connected in sequence; the image analysis device is used for acquiring indoor smart home environment status monitored by a smart sensor arranged indoors, and analyzing and judging whether the indoor smart home environment status meets preset operation trigger conditions or not; the smart home control device is used for controlling working status of smart home according to operation rules corresponding to the operation trigger conditions when the indoor smart home environment status meets the preset operation trigger conditions. By the equipment, the technical problem of low safety in smart home equipment in the prior art is solved, and the technical effect of improving safety of the smart home equipment is realized.
Owner:极友家居科技(上海)有限公司

Secret key generation method and system, storage medium and electronic device

The invention provides a secret key generation method and system, a storage medium and an electronic device, and the method comprises the steps: transmitting an updating request to a server, the updating request being used for requesting the server to update an original root sequence corresponding to target slave equipment; sending a target updating instruction is sent to the target slave equipment, wherein the target updating instruction comprises an encrypted first root sequence, the first root sequence is obtained after the server responds to the updating request to update the original rootsequence, the target updating instruction is used for indicating the target slave equipment to update the original root sequence stored in the target slave equipment into the first root sequence, andthe first root sequence is used for generating a dynamic key; and receiving first data sent by the target slave equipment, the first data being obtained by encrypting a new dynamic key, and the new dynamic key being generated by the target slave equipment according to a key generation algorithm stored in the target slave equipment and the first root sequence. According to the invention, the technical problem of low security of the secret key in the prior art is solved.
Owner:SUNWAVE COMM

Vehicle automatic driving method and device and vehicle

The application provides a vehicle automatic driving method and device and a vehicle. The method comprises the following steps: acquiring vehicle running information transmitted by a surrounding vehicle through atmospheric optical communication by controlling an atmospheric optical communication module on a target vehicle; determining a position relationship between the target vehicle and the surrounding vehicle according to the set position of the atmospheric optical communication module on the target vehicle; and perform automatic driving control on the target vehicle according to the position relationship and the corresponding vehicle running information. According to the method, the running information of the surrounding vehicle is acquired through the atmospheric optical communicationmodule arranged on the target vehicle in order to perform automatic driving control on the target vehicle, so that the technical problem of incapability of correctly planning a running route in the automatic driving process of the vehicle since the running information of a vehicle in a certain area is acquired while the running information of the surrounding vehicle cannot be accurately acquiredwhen the wireless communication module is used for acquiring the running information of the surrounding vehicle in the prior art is solved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products