Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43results about How to "No tampering" patented technology

Information safety algorithm based on energy information gateway in smart power grid

The invention relates to an information safety algorithm based on an energy information gateway in a smart power grid, ad an introduced safety mechanism is divided into an identity verification process, an encryption information message format and an information communication process according to a connecting flow path. Based on an RSA encryption algorithm, an advanced encryption standard (AES), digital signature and other technologies, the safety mechanism with instruction information transmission confidentiality, integrity and non-repudiation is achieved. By using the respective advantages of the three technologies, the condition that a smart electricity using network transmits sensitive information in a public network is combined, the situations of identify forging, data stealing, repeated attack sending and the like are considered sufficiently, and a bi-directional identity verification and safe instruction transmission mechanism is provided, so that the data attacks are effectively prevented, and traceability of instructions is ensured. A practicable and reliable solution is provided for safe data transmission in the demand response and home automation technology in China.
Owner:SHANGHAI SHANGTA SOFTWARE DEV CO LTD

A joint learning method and system based on a public block chain and an encrypted neural network

The invention discloses a joint learning method and system based on a public block chain and an encrypted neural network. The method comprises the following steps of: enabling the terminal to downloada universal neural network model pre-constructed on the server; performing Training using local data, obtaining gradient updating data and encrypting the gradient updating data; acquiring encrypted data and a first identification code, sending the encrypted data to a server; calculating a hash value of the first identification code and uploading the hash value to the block chain; enabling a server to decrypte encrypted data, obtaining the sum of the second identification code and the gradient updating data, calculating the hash value of the second identification code, then verifying whether the hash value of the first identification code is consistent with the hash value of the second identification code or not, if yes, updating the universal neural network model by using the sum of the gradient updating data, otherwise, not updating, and repeating the above steps until the model meets a preset convergence condition. In the process of completing deep network training, user informationcan be prevented from being leaked, and it is guaranteed that transmission data are not leaked or tampered.
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD

Electronic equipment data credible acquisition and evidence storage method based on blockchain technology

The invention discloses an electronic equipment data credible acquisition and evidence storage method based on the blockchain technology, and the method comprises the steps: generating a unique public and private key pair for electronic equipment according to an equipment manufacturer name, an equipment model and an equipment SN number; through a private key signature and public key signature verification mode, guaranteeing that the server can confirm the identity of the device when the data collected by the device is sent to the server in real time, and guaranteeing that the data is not tampered. A strict progressive increase operation sequence number is maintained for each device, and a timestamp synchronization mode is adopted, so that the data uploading sequence of the devices is consistent with the collection sequence. And the data uploaded by the equipment is not lost or deleted in an offline period in a mode of maintaining a strict progressive increase operation sequence number for each piece of equipment. And the server stores the public key of the electronic equipment and is bound with the information of the electronic equipment. The whole process of data from collection to storage is transparent, credible and non-tampering through the block chain and encryption technology.
Owner:HANGZHOU VASTCHAIN TECH CO LTD

Networked vehicle remote upgrading system and method with anti-attack bidirectional authentication

The invention belongs to the technical field of systematic safety of Internet of Vehicles, and discloses a networked vehicle remote upgrading system and method with anti-attack bidirectional authentication, a CA certificate system is used for performing identity authentication on a vehicle through a digital certificate in an Internet of Vehicles network, and supporting bidirectional authenticationbetween a TSP and a networked vehicle. A TSP system is used for supporting remote upgrading of vehicles. A T-BOX system is used for detecting the IP of the TSP during upgrading; wherein the IP is notthe IP of the TSP, and the data packet of the IP is discarded; and in a non-upgrading state, external communication is compared according to rules in the security rule base of the firewall, and rulesof the rule base are updated through TSP real-time operation. According to the invention, the reliability authentication of the bidirectional identity between the networked vehicle T-BOX and the vehicle remote service provider TSP is realized, and the identity counterfeiting is prevented; reliability of data transmission between the T-BOX and the TSP is achieved, and illegal stealing and tampering of automobile upgrading software in the transmission process are prevented.
Owner:CHENGDU UNIV OF INFORMATION TECH

Internet data verification method and system

ActiveCN109995776ASafe and reliable accessImplement the validatorTransmissionData verificationClient-side
The embodiment of the invention provides an Internet data verification method and system, and the method comprises the steps: receiving a data obtaining request sent by a user terminal, generating a predictor thread, and creating a TLS client in the predictor thread; the TLS client requests server side data from a network server corresponding to a uniform resource locator in the data acquisition request according to the uniform resource locator in the data acquisition request; the server side data is sent to an authentication server for authentication, a proof file authenticated by the authentication server is generated, and the proof file is sent to a user terminal; wherein the TLS client operates in a flying place. The embodiment of the invention provides a method. The TLS client runs inthe trusted secure computing environment enclave, so that codes of the TLS client and the symmetric key in the obtained TLS connection can be ensured not to be tampered, the authenticity of data obtained by the TLS client from the Server is ensured, and the data can be provided for any third party to verify the reliability of the evidence file.
Owner:西安纸贵互联网科技有限公司

Multi-node authentication method for trusted execution environment

The invention discloses a trusted execution environment (TEE) multi-node authentication method, which comprises the following steps of: assuming that a plurality of TEE computing nodes form a computing resource pool, and uniformly distributing computing resources by a computing resource management system; and setting a unified access and authentication node (AuthNode) for the the resource pool, wherein the node assists a user in completing the remote authentication process of all distributed TEE computing nodes. The method has the following advantages: 1, a user can authenticate the code security in the cloud computing environment, and realizes security protection on the computing process through the TEE; 2, the privacy protection of user data can be achieved, the user data are uploaded to the cloud environment in an encrypted state, and the data are only decrypted and used in the TEE; 3, the user can authenticate the correctness of the calculation result to ensure that the calculation result is not tampered; and 4, complete remote authentication is only carried out in a program deployment stage, the TEE authentication process is completed in the cloud environment, the user only needs to carry out simple local verification in the calculation process, and the execution efficiency is high.
Owner:TIANYI ELECTRONICS COMMERCE

Electronic warrant issuing method, cloud server and electronic warrant system

PendingCN113077233AOptimize the business environmentOptimize the market environmentFinanceDatabase distribution/replicationBusiness enterpriseOperations research
The invention discloses an electronic warrant issuing method, a cloud server and an electronic warrant system. The method comprises the following steps of pushing a project list according to order data and a project selection request; receiving the selected items and primarily screening a financial institution based on the attributes of the items to obtain a primarily reviewed financial institution list; based on the bid amount of the selected item, interacting with the transaction center system to obtain a guarantee residual responsibility and a guarantee upper limit of the financial institution; carrying out secondary screening on the first-review financial institution list; when the guarantee residual responsibility of the financial institution exceeds the guarantee upper limit and joint guarantee exists, or when the guarantee residual responsibility of financial institutions does not exceed the guarantee upper limit, the financial institutions being reserved; generating a final financial institution list based on the reserved financial institutions and feeding back the final financial institution list; and receiving the selected financial institution, generating a warranty order and sending the warranty order to the selected financial institution system. More financial institutions with the qualification of dealing are provided for enterprises for selection, market business is expanded for guarantee companies, financial industry chains are expanded, and insurance companies obtain associated business.
Owner:李冬

Education award teaching and learning assisting system based on blockchain

The invention discloses an education award teaching and learning assisting system, and relates to a blockchain, and the overall architecture of the system comprises an application layer, a consensus layer, a network layer, a data layer and an information checking terminal. The information checking terminal is respectively connected with the application layer, the consensus layer, the network layerand the data layer; the application layer comprises an intelligent contract module and a privacy protection module; the consensus layer comprises a consensus mechanism module; the network layer comprises a network protocol module and a transaction verification module; the data layer comprises a security algorithm module; the education award teaching and learning assisting system adopts a blockchain technology as a data transmission and distributed storage core service layer. According to the education award teaching and learning assisting system based on the blockchain, accurate docking, accurate management and accurate assistance can be realized. Through big data analysis, an assistant student tracking file is established, and the block chain records the real life condition of the student.
Owner:SHUNDE POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products