Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

76results about How to "Reduce the risk of being leaked" patented technology

Method and device for vehicle diagnosis

The invention relates to a method and device for vehicle diagnosis. The device comprises a downloading module, an execution module and a deletion module, wherein the downloading module is used for downloading a database containing data of a vehicle model which a specified vehicle belongs to from a server device when the vehicle diagnosis is conducted on the specified vehicle; the execution module is used for conducting the vehicle diagnosis on the specified vehicle according to the downloaded database; the deletion module is used for deleting the downloaded database after the vehicle diagnosis is completed. By means of the method and device for the vehicle diagnosis, the security of the vehicle diagnosis can be enhanced.
Owner:博世汽车服务技术(苏州)有限公司

Method for processing information, terminal, and server

The embodiment of the invention discloses a method for processing information, a terminal, and a server. The method comprises: unique identifier information of a terminal is obtained; according to a preset information splitting strategy, the unique identifier information is split into information segments; compression and encryption are carried out on the information segments according to a presetencryption strategy; and then the compressed and encrypted information segments are spliced to obtain to-be-sent target information and then the target information is sent to a server. When the terminal sends own unique identifier information to the server, the unique identifier information is compressed and encrypted and then the compressed and encrypted information is sent out, so that the dataflow needed for sending information by the terminal is saved; and safety of the unique identifier information is improved and the risk of leak of the unique identifier information is reduced.
Owner:深圳市诚壹科技有限公司

Message data processing method and device, server and terminal equipment

The invention provides a message data processing method and device, a server and terminal equipment. Based on the method, a server sends Cookie data at least containing a generation rule of a first secret key and a generation rule of a second secret key to the terminal equipment in advance; in this way, the server and the terminal equipment can generate the first secret key and the second secret key locally, interactive transmission of the secret keys is not needed, and the risk that the secret keys are leaked is reduced; moreover, before sending the request message, the terminal equipment encrypts the request message carrying the timestamp by using the first secret key and the second secret key; after receiving the encrypted request message, the server decrypts the encrypted request message by using the first secret key and the second secret key to obtain a timestamp; whether the request message has the security risk or not is detected according to the time information indicated by the timestamp and the receiving time of the encrypted request message, so that the request message with the security risk can be accurately detected with relatively low processing cost, and the data security is protected.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Processing method and device for file / application program on mobile communication terminal

The invention discloses a processing method and device for a file / application program on a mobile communication terminal. The method includes the steps that events which change in distance relative to the mobile communication terminal of other objects except the mobile communication terminal and operated events of the file / application program are monitored; if the events of the file / application program are monitored, and the events which change in distance are monitored within a preset time range, the operated file / application program is determined as an object needing to serve as privacy information to be protected; corresponding protection operation is carried out on the operated file / application program according to a preset privacy protection operating mode to prevent the operated file / application program to be revealed. Through the processing method and device, privacy information of users can be effectively protected in a process that files / application programs needing to serve as privacy information on terminal equipment are protected.
Owner:BEIJING QIHOO TECH CO LTD

Electronic bidding system and method

The invention relates to the technical field of digital information security transmission, and particularly relates to an electronic bidding and tendering system and method. The system comprises a server, and the server is used for obtaining bid inviting information; the server is further used for generating public and private key pairs according to the bid inviting information, encrypting privatekey certificates in the public and private key pairs based on a Shamir threshold to obtain a plurality of private key ciphertext, and generating a bidding tool according to the public key certificates in the public and private key pairs; the server is also used for updating the bidding tools according to any private key ciphertext during bidding, and the updated bidding tools are in one-to-one correspondence with the private key ciphertexts; the bidding tool is used for obtaining bidding information, encrypting the bidding information to obtain a bidding ciphertext, and uploading the biddingciphertext and the private key ciphertext to the server; and the server is also used for generating a private key certificate according to the plurality of private key ciphertext based on the Shamir threshold during bid opening, and decrypting the bidding ciphertext according to the private key certificate. By adopting the scheme, the security of the private key certificate can be effectively ensured.
Owner:光奕科数据技术有限公司

Decentralized electronic academic certificate checking method and system

ActiveCN110955699AAddressing the risks of centralizationImprove securityDatabase distribution/replicationCommercePlaintextInternet privacy
The invention relates to a decentralized electronic academic certificate checking method and system, belongs to the technical field of electronic academic certificate acquisition, and solves the problem of electronic academic certificate checking. The method comprises the following steps: acquiring authorization for checking an electronic academic certificate of a student from a student terminal;requesting electronic academic certificate plaintext data from a school electronic academic certificate service platform; receiving electronic academic certificate plaintext data sent in a point-to-point manner after being authorized and verified by the school electronic academic certificate service platform; sending a request for checking the digital fingerprint of the electronic academic certificate on the block chain to an electronic academic certificate alliance block chain, and obtaining the digital fingerprint of the electronic academic certificate on the block chain after authorizationverification; and checking the authenticity of the plaintext data of the electronic academic certificate according to the digital fingerprint on the blockchain. According to the invention, decentralization is realized, an application mode of a traditional centralized educational background authentication platform based on data collection is changed, the risk of electronic academic certificate plaintext data uploading is solved, and the security is improved.
Owner:YGSOFT INC

Model training method and device, additional feature data obtaining method and device, equipment and medium

The invention provides a model training method and device, an additional feature data obtaining method and device, equipment and a medium. Obtaining a feature prediction model, the feature predictionmodel being trained based on the source data set, the feature prediction model being used for predicting at least one part of unique features of the source data based on at least one part of common features between the source data and the target data; obtaining a target data set; for each part of target data in the target data set, inputting at least one part of common features in the target datainto the feature prediction model to obtain at least one part of unique features predicted by the feature prediction model for at least one part of input common features; and taking at least one partof the predicted unique features as additional feature data of the target data. According to the method, the common features are taken as springboards, the unique features of the source data are migrated to the target data in a model migration mode, and the source data and the target data are not contacted in the process, so that the leakage risk of the source data is greatly reduced.
Owner:THE FOURTH PARADIGM BEIJING TECH CO LTD

Server, client, interaction system, and information transmitting and receiving method

The invention discloses a server, a client, an interaction system, and an information transmitting and receiving method. The method comprises the steps: transmitting a first message containing a preset image to the client, wherein the preset image is provided with a graphic code; receiving a second message, transmitted by the client, containing a touch screen operation record, wherein the touch screen operation record represents one or more touch screen operations recorded when the client displays the preset image; and obtaining a graphic code corresponding to the touch screen operation record according to the preset image. The invention solves a technical problem that the information safety is poor in a conventional information transmission scheme because the client has to-be-transmitted information plaintext.
Owner:SUMAVISION TECH CO LTD

Decentralized identity authentication system based on block chain

ActiveCN113259311AReduce the risk of fraudulent useComplete and secure authentication processKey distribution for secure communicationPublic key for secure communicationEngineeringAuthentication system
The invention provides a decentralized identity authentication system based on a block chain. The decentralized identity authentication system mainly solves the problems that in the prior art, user identity information is likely to be illegally used and leaked, and the system stability is poor. The system comprises a plurality of server nodes with the same function and power, namely authentication nodes, and each authentication node comprises an identity information acquisition module, a real name authentication module, a data storage module, an identity information signature module and an access verification module. The identity information acquisition module is responsible for acquiring identity registration information of a user, the real-name authentication module is responsible for performing real-name authentication and encryption on the identity registration information of the user, the data storage module is used for storing the encrypted identity information of the user by adopting a block + chain structure, and the identity information signature module is responsible for acquiring identity signature information of the user; and the access verification module is responsible for performing access verification on the identity signature module of the user. According to the invention, the security and stability of the decentralized identity authentication system are improved, and the method can be used for computers and computer networks.
Owner:XIDIAN UNIV

Data management method and device, computer equipment and storage medium

The embodiment of the invention discloses a data management method and device, computer equipment and a storage medium, and belongs to the technical field of computers. The method comprises the following steps: a cloud data server is provided with a private storage space, the private storage space closes local access permission, and the cloud data server decrypts encrypted user data in the privatestorage space in response to a data processing request to obtain decrypted user data; the decrypted user data is processed in the private storage space; and a processing result is sent to a management terminal. The encrypted user data is decrypted and processed in the private storage space, and the private storage space closes the local access permission, so that the cloud data server cannot obtain the decrypted user data, the process of processing and decrypting the user data in the private storage space is unknown to the cloud data server, and thus the user data can be processed, the risk that the user data is leaked can be reduced, and the security of the user data is ensured.
Owner:TENCENT TECH (BEIJING) CO LTD

Biological recognition payment method and device, gateway equipment and storage medium

The invention provides a biological recognition payment method and device, gateway equipment and a storage medium, and relates to the field of data processing. The biometric identification payment method comprises: receiving a biometric identification routing payment request message, wherein the biometric identification routing payment request message comprises a first biometric identification payment group token and first biometric characteristic data, and the first biometric identification payment group token is used for representing that an initiating user of the biometric identification routing payment request message has biometric identification payment permission in the first group; determining a first group according to the first biometric identification payment group token, and performing biometric identification by using the first biometric characteristic data and a biometric characteristic database corresponding to the first group to obtain a biometric identification result;and sending the biological recognition result to payment equipment, so that the payment equipment initiates a payment process according to the biological recognition result. By means of the technicalscheme, the safety of biological recognition payment of the user can be improved.
Owner:CHINA UNIONPAY

Method and device for processing file/application program on mobile communication terminal

The invention discloses a method and a device for processing a file / application program on a mobile communication terminal. The method includes the steps: monitoring the motion state of the mobile communication terminal and an operated event of the file / application program; determining the operated file / application program as an object needing to be protected as privacy information if the operated event of the file / application program and the motion state of the mobile communication terminal meeting preset conditions within a preset time range are monitored; correspondingly protecting the operated file / application program according to a preset privacy protection operation mode to avoid leakage of the operated file / application program. By the method and the device, the privacy information of a user can be more effectively protected in the process of protecting the object needing to be protected as the privacy information on terminal equipment.
Owner:BEIJING QIHOO TECH CO LTD +1

Intelligent door lock control method, intelligent door lock and storage medium

The invention discloses an intelligent door lock control method, which comprises the steps of: receiving a first password input based on an intelligent door lock, wherein the first password is equipment identification information, uploaded by a wireless communication module in a power supply state, of the intelligent door lock received by a server, searching a first encryption factor matched withthe equipment identification information in a database, and then generating a first password based on the first encryption factor and a current timestamp; acquiring a second encryption factor stored in a wireless communication module, and generating a second password according to the current timestamp and the second encryption factor; and when the first password is consistent with the second password, controlling the intelligent door lock to execute an unlocking operation. The invention further discloses an intelligent door lock and a computer readable storage medium. Only the equipment identification information is interacted through the wireless network, the encryption factors can be prevented from being hijacked by the network, password leakage can be avoided by generating an unlockingpassword through the current timestamp and the encryption factor, and the safety of the intelligent door lock is improved.
Owner:SHENZHEN TCL NEW-TECH CO LTD

Method and device for controlling network connection of application terminal

The invention relates to a method and device for controlling network connection of an application terminal. The method comprises the steps of: determining whether one or more connected devices are devices in an application terminal device list or not; and, on the basis of a determination result, controlling network connection of the application terminal. Thereby, according to the embodiment of the invention, the application terminal can automatically control network connection according to the connected devices, instead of being always connected with a network; therefore, the data leakage risk of users is reduced; and simultaneously, the power consumption of the application terminal is reduced.
Owner:BOE TECH GRP CO LTD

Decentralized electronic education background management system and method

The invention relates to a decentralized electronic education background management system and method, and belongs to the technical field of electronic education background certificate acquisition, solving the problems of electronic education background certificate application and inspection. The decentralized electronic education background management system comprises an electronic education background alliance block chain and a client, wherein the electronic education background alliance block chain processes the electronic education background certificate application and check request and performs uplink storage on the electronic education background application data; and the client establishes connection with the electronic education background alliance block chain, initiates an electronic educational background application request to the electronic educational background alliance block chain, and acquires electronic educational background plaintext data from school block chain nodes in the electronic education background alliance block chain in a point-to-point manner, or initiates an electronic education background check request to the electronic education background allianceblock chain, and judges the authenticity of the electronic education background. According to the decentralized electronic education background management system, decentralization is realized, and anapplication mode of a traditional centralized education background authentication platform based on data collection is changed, so that the risk of data centralization is solved, and the security isimproved.
Owner:YGSOFT INC

Anti-attack arbitration device

The invention discloses an anti-attack arbitration device comprising a multiplexer, a sharing resource module and a demultiplexing device and further comprises a scrambler and descramblers. The scrambler is added to conduct xor operation before the demultiplexer to scramble original response data; and a plurality of descramblers are employed to increase xor operation after the demultiplexing device to demultiplex for the scrambled response data. When a request response and an output response of the arbitration device are not finished in the same clock period, a scrambling register has to be added to save request data responded during the request response period and then finish xor operation with the original response data during the output response period; and safety performance of the arbitration device can be improved and anti-attack property can be enhanced.
Owner:SHENZHEN STATE MICRO TECH CO LTD

Data storage method and device

The embodiment of the invention provides a data storage method and device, and the method comprises the steps of obtaining a to-be-stored data set uploaded by a user, and determining the set attribute of the to-be-stored data set; according to the set attribute, distributing a storage bucket in a data storage system to the to-be-stored data set, and the storage bucket being a storage space which has unified access permission and is used for storing data; and storing the to-be-stored data set in the allocated storage bucket. When the scheme provided by the embodiment is applied to data storage, the risk of data leakage can be reduced.
Owner:北京聚云科技有限公司

Secure transmission method and device, computer equipment and storage medium

The invention relates to the technical field of computer network security, and provides a secure transmission method and device, computer equipment and a storage medium. The method comprises: a client receives an AES key and an RSA public key sent by a server, the AES key being generated by the server according to a temporary token and having a period of validity; encrypting the transmission task data according to the AES key to obtain encrypted data; encrypting the AES secret key according to the RSA public key to obtain an encrypted secret key; and packaging the encrypted data and the encryption key to obtain a transmission data packet, and sending the transmission data packet to a server side. According to the method, the server side encrypts the transmission task data according to the AES secret key generated by the temporary token, the token is temporarily generated by the server side, the timeliness of the AES secret key generated according to the temporary token is limited, the risk that the secret key is leaked is reduced, the AES secret key is encrypted according to the RSA public key, and the encryption efficiency is improved. And the security of the transmission task data and the security of the key are ensured.
Owner:PING AN PENSION INSURANCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products