Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

63results about How to "Reduce tampering" patented technology

Electronic signature method, device, device and medium

An embodiment of the application discloses an electronic signature method. An electronic device signs a seal file by using a private key to obtain a signature file, and generates a signature file digest according to a digest algorithm and the signature file. A signature information digest is generated according to the signature information and the digest algorithm. The signature information includes at least a signature file, a signature file digest and a digital signature certificate. The signature encryption information is generated by encrypting the signature information and the signature information digest with the public key of the third party fair organization, and the signature encryption information is stored in the block chain network. The signature encryption information is generated by encrypting the necessary information generated in the process of electronic signature with the public key of the third party fair organization, which ensures that other organizations or individuals except the third party fair organization can not decrypt the signature encryption information privately, and reduces the risk of information being tampered with or stolen; The signature encryption information is stored in the block chain network with anti-tamper mechanism, which ensures the authenticity and security of the information.
Owner:HUNDSUN TECH

Security control method and security control system of mobile payment

The invention discloses a security control method and a security control system of mobile payment. The method comprises the following steps that: a transaction platform is logged in through a mobile phone, and a voice channel of the mobile phone accesses a security token; the transaction platform and the security token carry out two-way authentication; after the two-way authentication passes, the mobile phone imports user payment data and transmits the user payment data to the security token through the voice channel; the security token calls an encryption algorithm and key data, which are arranged in the security token, encrypts the user payment data, and returns the encrypted user payment data and corresponding digital signing information to the mobile phone; and the mobile phone transmits the encrypted user payment data and the corresponding digital signing information to the transaction platform. By adoption of the embodiment of the invention, risks on faking of the user identity, falsification of transaction information and theft of account assets can be reduced, and the security of the mobile payment is improved.
Owner:GRG BAKING EQUIP CO LTD

Trusted data transmission method and system, electronic equipment and storage medium

The invention provides a trusted data transmission method and a system, electronic equipment and a storage medium. The trusted data transmission method comprises the following steps: acquiring data; calculating an abstract value of the collected data, and encrypting the abstract value according to a private key of the edge computing node to generate an edge computing node signature; generating a message serial number for the acquired data; caching the abstract value and the message serial number of the acquired data; generating a data message according to the public key of the target blockchain node; sending the data message to the target blockchain node for decryption and verification; receiving a feedback message sent by the target blockchain node; and decrypting the feedback message according to the private key of the edge computing node, comparing the decrypted data with the cached abstract value and message serial number of the acquired data, and if the decrypted data is consistent with the cached abstract value and message serial number of the acquired data, finishing the transmission of the acquired data. According to the method and the device provided by the invention, thesecurity of message transmission between the Internet-of-thingsInternet-of-things and the blockchain can be realized.
Owner:上海诚频信息科技合伙企业(有限合伙)

Method for hierarchichal onion rings routing

The invention discloses a method for hierarchichal onion rings routing. The nodes in a wireless Mesh network are divided into a gateway G, trusted nodes OP (Onion Proxy) and normal nodes Fi, wherein, the trusted nodes OP and the gateway G are induction nodes; the trusted nodes OP serve the function of selecting a route during the initialization of the ring; and the assembly of all the trusted nodes OP and the gateway G constitutes an anonymous assembly. The onion routing of the network is divided into two loop layers, wherein, the first route layer is a loop route consisting of the non-adjacent trusted nodes OP and the gateway G of the anonymous assembly; and the second route layer is a loop route formed by filling normal nodes Fi among the trusted nodes OP, and the second route layer is randomly selected by the trusted nodes OP and the gateway during the initialization. Accordingly, the anonymous and secure communication in the Mesh network can be achieved by the layered loops of the onion rings route. By using the layered onion rings communication protocol and allowing the trusted nodes OP and the gateway of the anonymous assembly to select the route together, the invention can effectively mix up the paths and prevent the intersection attacks, thereby reducing the computation, alleviating the load of the gateway, accelerating the ring construction, preferably utilizing the network resources to reduce delay.
Owner:XIDIAN UNIV

Fingerprint authentication method and system and fingerprint template encrypting device

The invention discloses fingerprint authentication method and system and a fingerprint template encrypting device. The method comprises the following steps: processing fingerprint characteristics data from a background system by a smart card to produce a ciphertext template; acquiring a chip serial number of the smart card by a POS machine according to the acquired identity of the smart card when verifying the validity of the identity authorization code of the smart card by the POS machine; performing double authorization according to the acquired chip serial number of the smart card and the smart card; acquiring the fingerprint characteristics data of a card holder by the POS machine after the passing the double authorization; scrambling the acquired fingerprint characteristics data and then sending to the smart card; recovering the received scrambled fingerprint characteristics data by the smart card; decrypting the ciphertext template; matching the decrypted ciphertext template and the recovered fingerprint characteristics data; returning the matching result to the POS machine. According to the technical scheme, the method has the advantages that the possibility that a fingerprint template is tampered or forged is reduced, and the safety of the fingerprint authorization system is improved.
Owner:北京大唐智能卡技术有限公司

Operation management method for base station equipment and base station equipment

The embodiment of the invention provides an operation management method for base station equipment and the base station equipment and relates to the technical field of communication. According to theembodiment of the invention, distributed storage can be carried out on recorded resource usage amount of the base station equipment, so the data security and accuracy are improved. The method comprises the steps that target base station equipment receives communication requests of terminals in a first preset time period; the target base station equipment records operation information of the targetbase station equipment when the target base station equipment provides communication service for the communication requests; the target base station equipment sends the operation information to the other base station equipment in a preset area, thereby enabling the other target base station equipment in the preset area to update operation bills stored in the base station equipment; and the targetbase station equipment determines the resource usage amount of the target base station equipment in the first preset time period according to the operation bills stored in the base station equipmentwithin the preset area through utilization of a consensus mechanism. The method is applied to the operation management of the base station equipment.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD +2

Data integrity rapid authentication method and system based on quantum secret communication, terminal and storage medium

PendingCN111726224AImprove integrityFast implementation of integrity verificationKey distribution for secure communicationComputer networkData integrity
The invention provides a data integrity rapid authentication method and system based on quantum secret communication, a terminal and a storage medium. The method comprises the steps that a data sending end and a data receiving end obtain a quantum shared key; the plaintext data of the data sending end and the shared key are subjected to hash operation to generate a first hash value, and the plaintext data and the first hash value are sent to the data receiving end; hash operation is performed on the received plaintext data and the shared key to generate a second hash value; the first hash value is compared with the second hash value to verify data integrity. According to the invention, a quantum key is used to replace a traditional key to carry out hash operation so as to carry out data integrity verification; according to the method, the risk that the hash function is cracked when data integrity verification is carried out can be reduced, authentication needs to be carried out on thetwo communication ends during data communication to ensure authenticity and integrity of data, rapid authentication needs to be carried out during large-scale communication, and data integrity and authenticity verification can be rapidly achieved by adopting the quantum key to carry out hash operation.
Owner:BEIJING INFORMATION SCI & TECH UNIV

Method and device for encryption/decryption of executable program data package

The invention provides a method and device for encryption/decryption of an executable program data package. The method comprises the steps that the executable program data package is acquired; based on preset rules, the executable program data package is divided into multiple original documents; a first secret key is used to encrypt the multiple original documents respectively, so that encryption documents which have one-to-one correspondence relations with each original document respectively can be obtained; the multiple encrypted encryption documents are received; a second secret key corresponding to the first secret key is used to decrypt the multiple encryption documents respectively, so that the multiple original documents which have the one-to-one correspondence relations with the encryption documents can be obtained; and index information of the original documents are used respectively to reform the multiple original documents, so that the executable program data package can be obtained. The method and the device provided by the invention have the advantages that vicious decryption of the executable program data package caused by theft of a single secret key in the executable program data package can be prevented; a probability of the vicious decryption of an application program can be reduced; and data safety of the application program can be enhanced.
Owner:SHENZHEN UNIV

Visual three-dimensional code touch screen compiler and programming technique

The invention discloses a visual three-dimensional code touch screen compiler product and its programming technique. According to the invention, visual geometric programming and three-dimensional code programming are realized; a programmer can finish programming work by one-hand or two-hand touch screen operation, therefore the workload of the programmer is greatly reduced; and the programming work is driven to humanized and intelligentized development. The built-in technologies of the new type geometric decoder and three-dimensional compiler of the invention comprise: generating a code plate and selecting a code element, coding a rule, information expression, hexadecimal number expression, conversion of digital and geometric codes, plane code to three-dimensional code, and so on; the functions of the compiler comprise: a touch screen function, program three-dimensional coding, a three-dimensional code paraphrasing function, an intelligent detection function, an automatic code storage function, an automatic connection function of three-dimensional code chains, and so on. According to the invention, the program code is converted into a shape code; a new pattern is provided for the security operation of the program; each code chain is not divided, so there is no leak for an external virus program to implant; the program is effectively prevented from being tampered and attached; and the program security is improved.
Owner:JIANGSU FIGURE CODE INFORMATION TECH LTD

Digital watermarking processing method for BMP image

The invention relates to a digital watermarking processing method for a BMP (bitmap) image, which belongs to the technical field of computer application. The method comprises the following steps of: firstly, building three folders in an SD card; next, automatically loading programs cured in an Flash memory by the digital watermarking processing system for BMP image after startup, and transmitting image data to a digital watermarking processing module for processing through an SDRAM (Synchronous Dynamic Random Access Memory) controller and a data bus; then, caching the BMP image data with watermarking information to an SDRAM memory through the data bus and the SDRAM controller; finally, writing the image data to the SD card in an SD card interface through the SDRAM controller, the data bus and the SD card controller, storing the BMP image embedded with the watermarking information, after storing, lighting up an LED indication lamp and finishing processing. The method is fast for processing speed, small in volume, simple, portable and convenient to timely execute copyright protection on the obtained original image information.
Owner:KUNMING UNIV OF SCI & TECH

Trusted network communication method and device based on safety chip hardware algorithm module

The invention discloses a trusted network communication method and device based on a safety chip hardware algorithm module. The method comprises the following steps of when a system is started, constructing the trust chain of a current system from the beginning of power on; when the application program of the current system initiates service connection to the opposite end system of the current system, carrying out first integrity measurement on the application program based on a whitelist mechanism, and according to a first integrity measurement result, determining whether the service connection is allowed to establish; and during a service connection maintenance process, carrying out a second integrity measurement on the application program based on the triggering of a predetermined instruction, and according to a second integrity measurement result, determining whether the service connection is continuously maintained. When the application program initiates the service connection tothe opposite end system, the first integrity measurement is performed, and during the service connection maintenance process, the second integrity measurement is performed so as to reduce a possibility that transmission data between a terminal system and a main station system is stolen, and improve the safety and the credibility of the method.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +3

Tamper-proofing storage system of network device resource exploration information and control method thereof

The present invention provides a tamper-proofing storage system of network device resource exploration information and a control method thereof, and relates to the field of information safety. The system comprises a base station and a plurality of intelligent devices connected with the base station, the base station and the intelligent devices are all provided with fog computing programs, the basestation is provided with a fog computing center virtual machine, the intelligent devices are provided with a plurality of fog computing sub virtual machines, the sub virtual machines are managed by the center virtual machine, and the center virtual machine and the sub virtual machines are all provided with data packet analysis programs. The tamper-proofing storage system of network device resource exploration information and the control method thereof reduce the computing amount of the base station, improve the large-scale data processing capacity and provide enough computing power for the blockchain technology.
Owner:SHANGHAI JIAO TONG UNIV

Intelligent contract information flow integrity verification method and system based on type detection

PendingCN113051624AReduce the probability of credible information being tampered withReduce tamperingDigital data protectionSecurity informationValidator
The invention discloses an intelligent contract information flow integrity verification method and system based on type detection, and belongs to the field of block chains and information security. The method can be used for solving the problem of potential information tampering of the smart contract in an Ethereum block chain environment. The method comprises the following steps: constructing formalized grammar and semantics for a smart contract programming language; constructing a security type system STC of the smart contract, wherein the STC is used for detecting the integrity of information flow of the smart contract; and constructing a type verifier STV based on an intelligent contract type system STC, and searching optimal security type allocation automatically for state variables of the intelligent contract. According to the method, formalized grammar and semantics of the smart contract are given, meanwhile, the advantages of type detection in security information flow check are combined, the information flow integrity of source codes of the smart contract can be effectively analyzed and verified, and the probability that credible information is tampered in the running process of the smart contract is reduced.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Method for hierarchichal onion rings routing

InactiveCN101635918BPrevent intersection attacksReduce tamperingSecurity arrangementSecure communicationComputer network
The invention discloses a method for hierarchical onion rings routing. The nodes in a wireless Mesh network are divided into a gateway G, trusted nodes OP (Onion Proxy) and normal nodes Fi, wherein, the trusted nodes OP and the gateway G are induction nodes; the trusted nodes OP serve the function of selecting a route during the initialization of the ring; and the assembly of all the trusted nodes OP and the gateway G constitutes an anonymous assembly. The onion routing of the network is divided into two loop layers, wherein, the first route layer is a loop route consisting of the non-adjacent trusted nodes OP and the gateway G of the anonymous assembly; and the second route layer is a loop route formed by filling normal nodes F among the trusted nodes OP, and the second route layer is randomly selected by the trusted nodes OP and the gateway during the initialization. Accordingly, the anonymous and secure communication in the Mesh network can be achieved by the layered loops of the onion rings route. By using the layered onion rings communication protocol and allowing the trusted nodes OP and the gateway of the anonymous assembly to select the route together, the invention can effectively mix up the paths and prevent the intersection attacks, thereby reducing the computation, alleviating the load of the gateway, accelerating the ring construction, preferably utilizing the network resources to reduce delay.
Owner:XIDIAN UNIV

Trusted data transmission method and system, electronic equipment and storage medium

InactiveCN112825522ANot tampered withGuaranteed invisibleTransmissionMessage deliveryEdge computing
The invention provides a credible data transmission method and system, electronic equipment and a storage medium. The credible data transmission method comprises: collecting data; calculating an abstract value of the collected data, and encrypting the abstract value according to a private key of the edge computing node to generate an edge computing node signature; generating a message serial number for the collected data; caching an abstract value and a message serial number of the collected data; generating a data message according to the public key of the target block chain node; sending the data message to the target block chain node for decryption and verification; receiving a feedback message sent by the target block chain node; and decrypting the feedback message according to the private key of the edge computing node, comparing the decrypted data with the cached abstract value and message serial number of the collected data, and if the decrypted data are consistent with the cached abstract value and message serial number of the collected data, completing the transmission of the collected data. According to the method and the device provided by the invention, the security of message transmission between the Internet of Things and the block chain can be realized.
Owner:ROOTCLOUD TECH CO LTD

Key distribution method and device, mobile terminal, communication equipment and storage medium

The embodiment of the invention provides a key distribution method and device, a mobile terminal, communication equipment and a storage medium. The method comprises the following steps: extracting authentication information and a user key according to received authentication scheduling; generating a first verification key according to a key generation rule; and returning an authentication responsemessage to the mobile network side, after receiving the authentication response message, enabling the mobile network side to send the authentication response message; acquiring corresponding authentication information and a user key to generate a second verification key; encrypting the first secret key information; obtaining a third secret key and returning the third secret key to the mobile terminal; and enabling the mobile terminal to decrypt the third key information according to the first verification key. According to the method and the system, the security problem of the mobile terminalwhen the mobile terminal accesses the mobile network is solved by issuing the secret key based on the mutual mode, the real-time updating of the secret key is ensured, the tampering of the secret keyis reduced, the security is further improved, and the security performance of the system is also greatly improved.
Owner:ZTE CORP

Archive data protection method based on block chain

The invention relates to an archive data protection method based on a block chain. The method comprises the steps of obtaining archive data, classifying the archive data to obtain at least two archivedata sets, storing and backing up to the corresponding storage space; storing the first characteristic parameter of each archive data set in a block chain network, obtaining an actual second characteristic parameter according to the target archive data set, obtaining a first characteristic parameter from the block chain network; verifying according to the first characteristic parameter and the second characteristic parameter; and if the archive data set stored in the backup space does not pass the verification, replacing the archive data set in the corresponding main storage space with the archive data set stored in the backup space; when the archive data are extracted, firstly carrying out identity verification, then comparing related verification codes; and after the archive data passesthe verification, obtaining and outputting a to-be-extracted archive data set. The archive data protection method can effectively reduce the possibility that the archive data are illegally stolen, tampered and destroyed, and effectively improve the security of archive data management.
Owner:ZHEJIANG GUANGSHA COLLEGE OF APPLIED CONSTRTECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products