Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

126results about How to "Reduced risk of tampering" patented technology

Asset transaction method and device

The invention discloses an asset transaction method and a system. The method comprises steps that an acquired first transaction request is signed by a consignment agency, the first transaction request after signature is sent to the block chain network established on the basis of the P2P network, the first transaction response data is constructed by an issuing mechanism on the basis of the first transaction request acquired from the block chain network, the first transaction response data is sent to the block chain network so that validity of the first transaction response data can be confirmed by a block chain node on the block chain network responsible for accounting, the first effective transaction response data is written in a block chain data block, the block chain data block is acquired by the consignment agency through the block chain network, and asset transaction with the issuing mechanism and the consignment agency is accomplished. Through the method, transaction steps between the issuing mechanism and the consignment agency can be reduced in a transaction process, risks of being tampered of the data can be reduced, asset transaction confirmation cost is reduced, and operation cost of the block chain network is further reduced.
Owner:WEBANK (CHINA)

Trusted computing cryptogram platform suitable for general computation platform of electric system

The invention provides a trusted computing cryptogram platform suitable for a general computation platform of an electric system. The cryptogram platform comprises a trusted computing cryptogram module and a trusted software system, wherein the trusted computing cryptogram module comprises a trusted measurement root, a trusted storage root and a trusted report root and is a transferring starting point of a platform trust chain; and the trusted software system comprises a trusted computing cryptogram driving module, a measurement module and an auditing module and provides an interface which uses the trusted computing cryptogram platform for an operating system and application software. The trusted computing cryptogram module is the trusted root which provides trusted environment for the operation of the trusted computing cryptogram platform, and the trusted software system is a core for realizing the functions and the service of the trusted computing cryptogram platform and provides guarantee for the management of the trusted computing cryptogram platform. The trusted computing cryptogram platform can provide functions including static measurement, dynamic measurement, white lists, access control and the like for a business system, and manages the sources and the operation of the system software to guarantee that the software is trusted, recognizable and controllable.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +5

Intelligent contract bookkeeping method, computer device and readable storage medium

The invention is applicable to the field of computer technology, and provides an intelligent contract bookkeeping method, a computer device and a readable storage medium. The method comprises the following steps: a user bookkeeping node constructs an intelligent contract calling transaction, and broadcasts the transaction throughout the network after signing; The bookkeeping node verifies the contract call transaction after receiving the contract call transaction, and stores the contract call transaction into the contract queue after the verification is passed; At the same time, the contract management server transfers out the contract corresponding to the transaction from the contract queue and executes the contract, generates the contract execution result, and creates the contract returnresult transaction according to the contract execution result and broadcasts after signing; The bookkeeping node performs transaction signature verification after receiving the contract return resulttransaction, stores the contract return result transaction into the queue to be packed after verification, updates the intelligent contract information of the block and broadcasts the block, triggersthe bookkeeping operation. The bookkeeping operation safety of the invention is good, and the intelligent contract can be more focused on the service of the service data, thereby improving the service efficiency.
Owner:WEALEDGER NETWORK TECH CO LTD

Internet of things information system structure

The invention discloses an Internet of things information system structure and relates to the Internet of things transmission technology field. The structure comprises a sensor system, a sensing network, a service provider equipment system, a common service facility system and a user terminal. The sensor system establishes a communication protocol with a service provider management facility system through the sensing network. The service provider management facility system establishes the communication protocol with the common service facility system. The common service facility system establishes the communication protocol with the user terminal. By using the Internet of things information system structure provided in the invention, the structure is simple, a transmission process is diversified, the structure is suitable for various kinds of Internet of things application systems and an application scope is wide.
Owner:CHENGDU QINCHUAN IOT TECH CO LTD

Data transmission method and device and electronic equipment

PendingCN111431724AReduce the risk of tamperingEnsure original integrityUser identity/authority verificationData transmissionCommon key
The invention discloses a data transmission method and device, and electronic equipment, and relates to the technical field of network security. The data transmission method comprises steps of based on a public key pair determined by a data receiver and a data sender through message negotiation, performing digital signature on the to-be-requested data in combination with a first private key and asecurity hash algorithm to obtain a first message abstract; packaging the first private key, the first message abstract, the to-be-requested data and the identification information of the data senderto generate an information request message; and sending the information request message to a data receiver, so that the data receiver verifies the integrity of the to-be-requested data based on the first private key and the first message abstract to ensure the original integrity in the data transmission process.
Owner:MICRO DREAM TECHTRONIC NETWORK TECH CHINACO

Method and device of upgrading Web software

The invention relates to the technical field of software upgrading and discloses a method and a device of upgrading Web software. The method comprises the following steps of: at an upgrade server side: generating an upgrade sequence set by an original upgrade package; encrypting the original upgrade package and the upgrade sequence set to obtain an encrypted upgrade package and an encrypted upgrade sequence set; at a local service side: decrypting the encrypted upgrade package and the encrypted upgrade sequence set to obtain a decrypted upgrade package and a decrypted upgrade sequence set; comparing a file included in the decrypted upgrade package and file information in the decrypted upgrade sequence set; if not matched, stopping upgrading; and if matched successfully, upgrading according to an upgrade file. According to the method and the device, when data are transmitted, the encryption processing is carried out on the data, so that the risk of tampering the data is reduced; in addition, accuracy of the obtained upgrade file is judged, so that security of software upgrading is improved.
Owner:武汉益模科技股份有限公司

Method, device and system for generating electronic contract based on handwritten signature picture

The invention discloses a method, device and system for generating an electronic contract based on a handwritten signature picture, relates to the technical field of electronic signatures, and can reduce the risk that the electronic contract is tampered. The method comprises the following steps: obtaining unique identification information of a to-be-signed electronic contract and an electronic handwritten signature picture; Encrypting the electronic handwritten signature picture according to the unique identification information of the to-be-signed electronic contract to generate an electronichandwritten signature picture carrying a digital certificate; Uploading the electronic handwritten signature picture carrying the digital certificate to a contract platform, so that the contract platform decrypts the electronic handwritten signature picture carrying the digital certificate to obtain the electronic handwritten signature picture and unique identification information of an electronic contract to be signed; Obtaining a to-be-signed electronic contract according to the unique identification information of the to-be-signed electronic contract; And splicing the electronic handwritten signature picture into the to-be-signed electronic contract to generate the electronic contract with the handwritten signature.
Owner:PING AN TECH (SHENZHEN) CO LTD

Hospital low-administration risk prevention and control system developed based on commercial intelligent system

The invention discloses a hospital low-administration risk prevention and control system developed based on a commercial intelligent system, and relates to the technical field of medical information.According to the system, all business information systems in a hospital are integrated together by using an existing business intelligent system; and the system performs the following steps: extracting information mainly monitored by hospital record inspection from data in an information island of an online running business system (HIS, RIS, LIS, HERP, PASS and the like) into a data warehouse through an ETL tool in a commercial intelligent system; carrying out data mining on the data in the data warehouse, defining the data into index items in a multi-dimensional manner, and then integrating the index items into data needing to be displayed; finally, data needing to be displayed is made into various charts through a sail soft report tool, and the charts are visually displayed through an information display platform. After the system is actually operated, the daily management workload of a hospital commemorator is greatly reduced, the risk that data is tampered is reduced, risk indexescan be monitored in real time, and adverse events and violation events are prevented from happening.
Owner:杨志刚

Identity verification method, device and equipment

The embodiment of the invention discloses an identity verification method, device and equipment. According to the scheme, the method comprises the steps that identity verification information shown bya user is acquired, the identity verification information is generated according to information fed back by a third-party server in response to an identity identifier generation request carrying a user identity certificate, and identity recognition information of the user is acquired; and performing identity verification on the user according to the identity verification information and the identity recognition information to obtain a verification result.
Owner:ADVANCED NEW TECH CO LTD

Coupon data processing method, device and system and storage medium

The embodiment of the invention discloses a coupon data processing method, device and system and a storage medium, wherein, the method comprises the following steps: a user terminal obtains coupon data corresponding to a service event in a first block chain node; the coupon data is service data selected in a user account based on the service event; the user terminal obtains the coupon data corresponding to the service event in the first block chain node; the user terminal sends the service event and the coupon data to the service terminal based on the service server; the service terminal receives the service event and the coupon data sent by the user terminal; the service terminal obtains the data transfer information corresponding to the coupon data in the second block chain node, and obtains the attribute information corresponding to the coupon data based on the service server; the service terminal verifies the coupon data based on the data transfer information and attribute information, and executes the service event after the verification is passed. By adopting the invention, the risk that the coupon data and the attribute information are tampered with can be effectively reduced, and the security of the coupon data and the attribute information can be improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Examination information evaluation method and device based on block chain, equipment and storage medium

The invention relates to the technical field of block chains, in particular to an examination information evaluation method and device based on a block chain, equipment and a storage medium. The method comprises: collecting examination information of an examination terminal, and establishing a block according to the examination information; assigning an ID identifier to the block, recording data generated by the block according to the ID identifier, and calling an intelligent contract to carry out contract check on the data generated by the block; and obtaining an examination result in the block which passes contract examination, scoring the examination result, and broadcasting the scoring result to a target block which needs to obtain the scoring result. Through the block chain technology, the risk that the examination performance is tampered is reduced, the counterfeiting risk is reduced for workplace workers, education training and the like, and the social activity efficiency is improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Device and method for assisting in realizing USB Key safety

The invention discloses a device for assisting in realizing USB Key safety. The device is connected between a device for operating an on-line bank system and a USB Key and comprises an information receiving unit, a control unit and an information transferring unit, wherein the information receiving unit is used for receiving transaction data information sent by the on-line bank system; the controlunit is used for sending the transaction data information to the USB Key when confirming information of users is received; and the information transferring unit is used for receiving the transactiondata information after the USB Key carries out digital signing and returning the transaction data information to the on-line bank system. By using the device, the common USB Key can have the same safety property with the USB Key with a confirm key. Simultaneously, if the control unit can not normally receive the confirming information, only the device is replaced without changing , therefore, thecost is saved.
Owner:CHINA CITIC BANK

Lithium battery core and manufacturing method thereof

The invention discloses a lithium battery core and a manufacturing method. The lithium battery core comprises at least one positive electrode sheet, at least one negative electrode sheet and at least one diaphragm, wherein the positive electrode sheet comprises a positive current collector and a positive electrode active material, the positive current collector comprises a plurality of first small sheets which are parallel at intervals, the adjacent first small sheets are connected by bent blank areas, the positive electrode active material is coated on the side surface of the first small sheet, the negative electrode sheet comprises a negative current collector and a negative electrode active material, the negative current collector comprises a plurality of second small sheets which are parallel at intervals, the adjacent second small sheets are connected by bent blank areas, the diaphragm is bent in an S shape, and the first small sheets and the second small sheets are sequentially and alternately connected to the space formed after the diaphragms are bent and between the adjacent diaphragms, and are connected with the diaphragms. The manufacturing method comprises the steps of inserting, folding and combining. According to the invention, the electrode sheets are fixed, the short-circuit risk of the battery core is reduced, the production efficiency is improved, the lamination qualification rate can be effectively improved, and the production process is effectively simplified.
Owner:HEFEI GUOXUAN HIGH TECH POWER ENERGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products