Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

47results about How to "Reduce the risk of being cracked" patented technology

Digital signature method, digital signature system and quantum key card

The invention discloses a digital signature method, a digital signature system and a quantum key card. The digital signature system comprises quantum network service stations, signature client sides, authentication client sides and quantum key cards, wherein the quantum network service stations are configured on the network side, and the signature client sides and the authentication client sides are configured on the user side. The digital signature method includes that a true random number is generated on the network side and then stored in the corresponding quantum key card and on the network side respectively to form a corresponding user-side key; the quantum key card matching with the signature client side uses the stored user-side key to generate a signature file, the signature file is sent to the authentication client side via the signature client side, and the authentication client side sends the received signature file to the current quantum network service station, acquires the corresponding user-side key from the network side to perform signature authentication on the signature file and sends signature authentication results to the corresponding authentication client side. The digital signature method, the digital signature system and the quantum key card have the advantage that key seeds are stored in the quantum key cards and the quantum network service stations, so that the problems of access use and safety of quantum network terminals are solved.
Owner:ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD

Trusted booting method based on TrustZone system

The invention discloses a trusted booting method based on a TrustZone system. The system is based on a system supporting a TrustZone technology, equipment of the system at least comprises memorizers,and the memorizers at least comprise an ROM and an RAM located in a security domain and a memorizer located in a generic domain. The method comprises the steps that S1, the system is started; S2, an ROM loading program located in the ROM is started; S3, loading verification is conducted on a bootstrap program of an operating system by the ROM loading program, and if the verification is passed, thebootstrap program of the operating system is started; S4, loading verification is conducted on a kernel program of the operating system by the bootstrap program of the operating system, and if the verification is passed, the kernel program of the operating system is started. According to the method, the trusted booted process of the system is deployed by using hardware technology characteristicsof a system on chip (SOC) of ARM, no additional trusted chip or trusted calculation module is needed, and cracked risks are reduced; the difficulty of circuit designing and the product cost are reduced.
Owner:XIAMEN YAXON NETWORKS CO LTD

Method and device for signing user program and method and device for verifying signature of user program

The invention discloses a method and a device for signing a user program verifying signature of the user program. The method for signing the user program includes steps of acquiring ID (identity) of a CPU (central processing unit), computing the user program by SHA-256 hash operation to obtain a program digest, compiling a public key and a module generated through RSA (Ron Rivest,Adi Shamirh and Len Adleman) encryption algorithm into the user program; combining the ID of the CPU, the program digest and the length of the user program in sequence to form a data string; operating the data string by a private key corresponding to the public key and the module to obtain ciphertext; and loading the ciphertext into a check area of the CPU. By combining with the RSA algorithm and the SHA algorithm to process the user program and integrating with the ID of the CPU to be a part of the signature, the user program must be restarted by being strictly subjected to the signature verifying process matched with the signature, risk in brute force attack to the user program is greatly reduced, and the user program can be effectively protected from being tampered or stolen maliciously.
Owner:恒鸿达科技有限公司

Verification code image generating method and device and verification method and device

ActiveCN103902875AReduce the success rate of machine recognitionReduce the risk of being crackedDigital data authenticationValidation methodsNetwork security
The invention provides a verification code image generating method and device and a verification method and device. The verification code image generating method and device and the verification method and device aim to lower the success rate of automatic identification of a machine. The verification code image generating method comprises the steps of generating a texture image, determining the position of a verification code, and modifying the pixel value of the texture image at the position of the verification code to obtain a verification code image. The verification code image generating method has the advantages that the success rate of automatic identification of a machine can be lowered, the risk that the verification code is cracked is lowered, and the network security is improved.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Key exchange method for communication of automobile electronic control unit

The invention relates to a key exchange method for automobile electronic control unit communication, which comprises the following steps that 1, an encryption object is selected, and a plurality of electronic control units are classified into a Master and a Slave; 2, a system is initialized, the Slave is accessed to the Master, and the Master checks whether a key parameter needs to be generated ornot; if so, a key parameter is generated, and simultaneously the key parameter is stored into safe storage areas of the Master and the Slave; if not, the originally generated key parameters are used;3, a secret key is generated in real time, after the vehicle is ignited each time, the Master and the Slave respectively generate a random number, and the secret key is generated according to secretkey parameters and the random numbers; and step 4, data encryption: the Master encrypts the communication data needing to be sent to the Slave through the secret key, and the Slave encrypts the communication data needing to be sent to the Master through the secret key. The secret key exchange method for automobile electronic control unit communication is low in encryption cost, does not need to establish a special server to store the secret key, is low in secret key leakage risk, and has very high safety.
Owner:HUIZHOU DESAY SV INTELLIGENT TRANSPORTATION TECH INST CO LTD

Anti-shearing reinforcement device and method for concrete box girder web

ActiveCN109537478ASolve the problem of excessive main tensile stressAvoid corrosionBridge erection/assemblyBridge strengtheningPre stressRebar
The invention relates to an anti-shearing reinforcement device and method for a concrete box girder web. In order to solve the problem that in existing engineering technologies, the concrete box girder web has cracking inclined cracks and insufficient anti-shearing bearing capacity, an external vertical prestressing tendon reinforcement device and method are provided. The device comprises groove-shaped steel, L-shaped steel, vertical prestressing tendons, wedge-shaped steel cushion blocks and an anti-corrosion coating at the outer side of the web. The groove-shaped steel is horizontally fixedto the junction of the upper end of the web and a top plate in the girder length direction. The L-shaped steel (6) is horizontally fixed to the lower end of the web in the girder length direction andis parallel to the groove-shaped steel (5). The vertical prestressing tendons are vertically mounted on the groove-shaped steel and the L-shaped steel, and it is ensured that the vertical prestressingtendons are parallel to the plane of the web. According to the anti-shearing reinforcement device and method, the web is connected with the top plate and a bottom plate through finish rolling twistedsteel, the force transmission path is definite, the risk that web concrete is pulled broken is reduced, and meanwhile, midspan deformation is reduced; the problem of insufficient main tensile stressof the web concrete is effectively solved, and the situations of continuous extension of the inclined cracks of the web or new inclined cracks are prevented.
Owner:BEIJING UNIV OF TECH

Improved AKA identity authentication system and method based on symmetric key pool and cross-relay

The invention discloses an improved AKA identity authentication system and method based on a symmetric key pool and a cross-relay. The AKA identity authentication system comprises a member, a relay and a server which participate in AKA identity authentication. The system is characterized in that the member, the relay and the server share a group key pool; the member and the relay are further respectively provided with a private key pool used for generating an authentication key, and the member and the relay independently share the private key pool with the server; the member and the relay share a corresponding pointer address in an AKA identity authentication process, and then a first negotiation key between the member and the relay is generated by combining the respective group key poolsof the member and the relay; the member and the server share the corresponding pointer address in the AKA identity authentication process, and then a second negotiation key between the member and theserver is generated by combining the respective authentication keys of the member and the server. According to the system and the method, the safety of communication can be further improved.
Owner:RUBAN QUANTUM TECH CO LTD

Password authentication method and system

The invention provides a password authentication method and system, and particularly relates to a password authentication method and system capable of realizing any one of or a technology of multipleof ''allowing alteration of a login account, simultaneously submitting multiple passwords for authentication, authenticating a password which is not used within a period of time based on a certain probability, authenticating a password which is not used within a period of time when characters in an input password are matched with characters in a real password within an appointed range and recording and counting password authentication failure information''. The password authentication method and the password authentication system effectively prevent such a situation that an illegal user cracksan account password, so that the account security is improved, and the user experience cannot be reduced.
Owner:易胜燕

Method and device for controlling encryption lock

Embodiments of the invention provide a method and a device for controlling an encryption lock. The method comprises the following steps of obtaining current clock time in the encryption lock, preset software expiration time in the encryption lock and a device identifier, wherein the device identifier is preset in the encryption lock and is an identifier of a device associated with the encryption lock; reading a target identifier of a target device connected to the encryption lock; and running a software program protected by the encryption lock if determining that the target identifier is the same as the device identifier and the current moment does not exceed the service life of software protected by the encryption lock based on the clock time in the encryption clock and the software expiration time. According to the method and the device, the risk of cracking of the encryption lock can be reduced and a condition that software resources protected by the encryption lock are stolen is reduced.
Owner:BEIJING FOREVER TECH

Authorization management method and system

ActiveCN108848064BReduce the risk of being crackedAvoid the disadvantages of increased management costsKey distribution for secure communicationCiphertextSoftware engineering
The embodiment of the invention provides an authorization management method and system. A hardware client side is additionally arranged; after being received at the hardware client side, an encryptedplatform hardware ID sent by an authorization client side is decrypted; furthermore, an authorization code is obtained by calculation according to the decrypted platform hardware ID; the authorizationcode is encrypted, so that a ciphertext is obtained; furthermore, the ciphertext is sent to the authorization client side; after decrypting the ciphertext, the authorization client side obtains the authorization code, and sends the authorization code to an embedded platform; the embedded platform stores the authorization code in a storage device; after the embedded platform is re-started, a verification authorization code is generated, so that the stored authorization code is verified; and, after verification is passed, a static library file in the embedded platform can work normally. According to the authorization management scheme, the interaction information is encrypted through additional arrangement of the hardware client side; therefore, the risk that the authorization information is cracked can be reduced; and furthermore, the disadvantage that the management cost is increased due to external connection of the IC in the prior art can be avoided.
Owner:WUHAN JIULE TECH

Information security verification method, device and equipment and storage medium

The invention relates to the technical field of communication security, and provides an information security verification method and device, equipment and a storage medium. The method comprises the following steps: sending a verification information receiving request to a server, wherein the verification information receiving request comprises a communication identification code of a terminal; receiving first verification information sent by the server based on the verification information receiving request; obtaining second verification information input by the user based on the first verification information; obtaining a first identification code stored locally; encrypting the second verification information based on the first identification code to obtain a first verification code; acquiring a second identification code pre-stored by the server based on the communication identification code; encrypting the second verification information based on the second identification code to obtain a second verification code; and determining a matching result of the first verification code and the second verification code, wherein the matching result indicates whether the information security of the terminal connected with the server passes the verification. By adopting the method, loss caused by verification information leakage and communication identification code leakage can be avoided, and the risk that the identification code is cracked in the verification process is reduced.
Owner:SHANGHAI WINGTECH ELECTRONICS TECH

Transformation encryption algorithm based on generation of random bit sequence

The invention discloses a transformation encryption algorithm generated based on a section of random bit sequence, and relates to the technical field of bit sequence generation, and the transformation encryption algorithm generated based on the section of random bit sequence comprises the following specific steps: 1, generating a random ciphertext; 2, encrypting a random 10-bit bit stream Y by a secret key digital part; 3, generating a header ciphertext; 4, generating a tail ciphertext; 5, generating a check code and a check ciphertext; 6, generating a true ciphertext; 7, generating a false ciphertext; 8, generating a judgment ciphertext; 9, generating a final ciphertext, wherein the random ciphertext in the step 1 is composed of two characters. According to the transformation encryption algorithm generated based on the random bit sequence, multiple encryption can be carried out, the confidentiality of the ciphertext can be improved, the cracking risk can be reduced, the security can be improved on the basis of a traditional method without too much overhead, the use cost can be saved, and popularization is convenient.
Owner:CHINA UNIV OF PETROLEUM (EAST CHINA)

Information security protection method, device, electronic equipment and storage medium

The invention provides an information security protection method, a device, electronic equipment and a storage medium. The information security protection method comprises the steps of receiving the request operation information of a user; according to a verification condition in the resource pool, performing credit granting verification of at least one level on the request operation information;if the credit granting verification of each level is passed, determining that the credit granting of the request operation of the user is successful, and granting a unique security identifier to the request operation of the user; if the credit granting verification of any level is not passed, determining that the request operation of the user fails in credit granting; wherein the at least one hierarchy comprises a behavior layer, performing credit granting verification of the at least one hierarchy on the request operation information according to a verification condition in the resource pool,and the method comprises the steps of determining whether an operation behavior in the request operation information is matched with a pre-registered operation type in a database or not; if so, determining that the credit granting verification of the behavior layer is passed; and if not, determining that the credit granting verification of the behavior layer does not pass. The method is helpful for improving the security level of the system.
Owner:BEIJING JINFENG HUINENG TECH CO LTD +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products