Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

134results about How to "Resolve trust issues" patented technology

Consortium chain-based digital bill trading system construction method

InactiveCN106780033AImprove safety and reliabilityAvoid reconciliation workFinanceTechnical supportBlockchain
The invention discloses a consortium chain-based digital bill trading system construction method, which develops a brand-new bill display form, namely, a digital bill in combination with existing bill attributes, laws and regulations and market by taking a consortium chain as technical support. Compared with an existing electronic bill, the digital bill is totally different from the electronic bill in technical framework, not only has all functions and advantages of the electronic bill but also fuses the advantages of a block chain technology, and is a securer, more intelligent, more convenient and more promising bill form. In addition, the block chain technology is applied to the field of bill businesses for the first time; a unified standard bill trading platform is established; the problems of trade background forgery, bill authenticity authentication failure, paper bill multi-time selling, non-synchronous electronic bill discounting and bill endorsing, and the like are solved; and various risks are effectively managed, controlled and prevented.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Customer data management system based on block chain

InactiveCN109063169AImprove timeliness and accuracyRelieve concurrent pressurePayment circuitsSpecial data processing applicationsCustomer intelligenceManagement system
The invention provides a customer data management system based on a block chain. Participants are connected to a financial union chain through a corresponding block link-in node, so as to realize theuplink of customer data, and realize the inquiry, addition, modification and synchronization of customer data according to the customer intelligent account book and the customer intelligent contract.The financial union chain designs a sectional protection lock for the customer data on the chain to realize the circulation of the customer data among the set participants; The client intelligent account book comprises a client information access authority, a newly added authority and a client information maintenance authority, wherein the client intelligent account book comprises a client information access authority, a client information access authority and a client information maintenance authority. Customer Intelligence Contract includes Customer Information Addition Service, Customer Information Maintenance Service and Customer Information Change Notification Service. The invention realizes the non-tampering, encrypted storage and privilege access of the uplink information, which canensure the privacy of the customer information and realize the cross-organization sharing of the public basic customer information on demand, such as the mobile phone number is shared between the operator and the government department, and between the operator and the bank.
Owner:FUJIAN RURAL CREDIT UNION

Distributed optimal scheduling method for interconnected micronetworks based on intelligent contract

The invention discloses a distributed optimization dispatching method of an interconnected micro-network based on an intelligent contract, which comprises the following steps: establishing a block chain of electric power transaction; setting the dispatching cycle, recording the electricity quantity sent and received in the dispatching cycle; the optimal dispatching model of interconnected micro-grid system being established and solved, and the optimal dispatching scheme being obtained. According to the optimal dispatching scheme, the transaction contents of the micro-grid involved in the transaction are determined, and the smart contract is signed and sent to other micro-grids in the network. The microgrid to reach consensus; verify the transaction, judge whether the transaction is safe ornot, cancel the transaction if it is not safe, complete the transaction if it is safe, and transfer funds between microgrids. The invention provides a distributed optimal dispatching model and a distributed iterative algorithm of an interconnected micro-grid system, and applies a block chain to the recording and value transfer of the distributed transaction, and signs an intelligent contract between the micro-grids, thereby solving the trust problem between the transaction parties and achieving high automation degree.
Owner:XIANGTAN UNIV

Bulk commodity transaction data processing system and data processing method

The invention relates to a bulk commodity transaction data processing system and data processing method, and belongs to the field of electronic commerce. The system comprises a transaction server which can be logged in by a buyer and a seller. The system is characterized in that the transaction server is at least provided with an order processing unit, a security deposit processing unit, a goods payment processing unit, a goods receipt confirmation unit, and a master control unit. The method comprises the steps that pending an order is conducted; ordering is conducted; paying the security deposit is conducted; earnest money is paid by the buyer; full payment is paid; the buyer confirms that the goods are received; the goods payment is transferred to the account of the seller; the security deposit is returned. According to the bulk commodity transaction data processing system and data processing method, the goods payment is not paid to a third-party transaction platform, but paid to a payment channel of a bank, the bulk commodity transaction data processing system and data processing method are especially suitable for online transactions between enterprises, and the phenomenon that taxes are paid for two times is avoided simultaneously.
Owner:SHANDONG ZHUOCHUANG INFORMATION GRP CO LTD

Credible advertisement data management system based on block chain

The invention belongs to the technical field of data security, particularly relates to a credible advertisement data management system based on a block chain, and solves the problems that the data reliability is low, the data is not public and transparent enough, the data can be manually operated and is easily tampered, the privacy protection is difficult, and the data security is difficult to guarantee. According to the invention, the block chain technology is applied to the media industry, the big data technology is combined, identity management and authorization and user identity bidirectional authentication are carried out on an advertiser and a media company based on the credible alliance chain, advertisement data are linked, and user data are transacted and analyzed. A safe and reliable advertisement data management method is provided for media companies, advertisers and consumers.
Owner:深圳大通实业股份有限公司

Supply chain prepayment financing method based on block chain of internet of things

PendingCN108694551AResolve trust issuesRealize the payment problemFinanceLogisticsPaymentSensing data
The invention provides a supply chain prepayment financing method based on a block chain of the internet of things. The method comprises the following steps: designing an intelligent logistics management and control system, acquiring the whole process management and control information of goods from container loading, transportation to container unloading by a sensor, and saving the sensing data to the block chain in real time as the basis of goods value preservation; and by combining with the traditional bank clearing network and block chain financial network to deposit and pay deposits, performing clearing and depositing and paying by using batch payment of the price for goods and batch right of taking delivery of goods. The invention designs a supply chain prepayment financing method based on the internet of things and the block chain technology, the issue of trust among multi-agency bodies has been effectively resolved, the invention realizes the payment problem of purchasing and selling goods and four-party silver under the heterogeneous network, the method is suitable for the safe transportation of goods of various enterprises, realizes the real-time collection and trustworthy saving of data in the transmission process, guarantees the value preservation of the goods transportation, reduces the risks of the bank, and effectively alleviates the short-term capital pressure brought by the full-amount purchase, and realizes the multi-win purpose.
Owner:FUJIAN RURAL CREDIT UNION

Safe data sharing method in cloud environment

The invention provides a safe data sharing method in a cloud environment. The safe data sharing method is provided in allusion to a problem of encrypted data access control in the cloud storage environment by combining CP-ABE (ciphertext-policy attribute-based encryption). According to the method, a problem of trusted third party dependency in a CP-ABE algorithm is solved through combining a symmetric key of a cloud storage center and a asymmetric private key of an authorized agency; secondly, user unique identification is added to an attribute private key of a user so as to enable a sharing mechanism to resist collusion attacks from illegal users; and finally, revocation of the user is completed through updating the symmetric key, the backward security of shared data is ensured, and the updating efficiency is improved.
Owner:SICHUAN YONGLIAN INFORMATION TECH CO LTD

Data transaction system and method based on smart contract technology of blockchain

The invention discloses a data transaction system and method based on smart contract technology of a blockchain. The system comprises a data selling end, a data purchasing end and a service node, thedata purchasing end pays corresponding digital assets to a smart contract running in a blockchain, stores a digital assets in the intelligent contract, and sends a loaning request to the smart contract after receiving the data file; and the smart contract sends the digital assets to the data selling end. The data transaction system based on the smart contract technology of the blockchain and the method thereof provided by the invention are realized by the smart contract on the blockchain, all digital assets in the transaction process are hosted in the smart contract on the blockchain, the assets are public, transparent and viewable, the digital assets are hosted in the smart contract, the problem of centralized trust does not exist, and the security of the data transaction system is improved. The transfer-in and transfer-out records of the digital assets in the smart contract are all recorded on the blockchain, can be checked publicly and cannot be modified, so that the trust problem of two transaction parties is solved.
Owner:杭州增信信息技术有限公司

The invention discloses a dData preprocessing method based on a block chain intelligent contract and machine learning

The invention discloses a data preprocessing method based on a block chain intelligent contract and machine learning. Data preprocessing on nodes is completed through cooperation of a block chain technology and a machine learning technology. The method specifically comprises the steps of collecting Internet of Things data, and standardizing the Internet of Things data after storing the Internet ofThings data to local nodes; C; creating a machine learning algorithm file on the local node, wherein the machine learning algorithm file is used for preprocessing the Internet of Things data; S; storing the data into a block chain; T; training a learning algorithm by using the linked data to obtain a model coefficient, and storing the model coefficient in a local node; Firstly, a machine learningalgorithm expression is written into an intelligent contract, and then an obtained model coefficient is stored into a block chain by calling the intelligent contract; P; processing the to-be-processed data by using the linked model; A; and storing the processed data into a block chain. According to the method, a machine learning algorithm is added into an intelligent contract of a block chain, and the data mining capability of the block chain is improved by utilizing machine learning.
Owner:BEIJING UNIV OF TECH

Multi-party privacy computing system based on trusted execution environment

The invention discloses a secure and credible data multi-party computation implementation mode under the condition that a plurality of participants exist. By adopting the computing system provided bythe invention, a provider of the original data can clearly know which objects acquires the provided original data , in what way the provided original data is acquired, and whether unauthorized use orpropagation exists in an analysis process and an analysis result of the original data or not; and a data demander can also ensure the accuracy and authenticity of the original data and the data calculation result. According to the computing system, the original data needing to be protected and the computing program are placed in a specified trusted execution environment for data sharing, and underthe condition that multi-party data computing and privacy protection requirements exist, the technical scheme can well solve the safety problem concerned by all parties in the multi-party data computing problem.
Owner:杭州宇链科技有限公司

Cloud computing cross-domain identity authentication method

The invention belongs to the technical field of cloud computing, and particularly relates to a cloud computing cross-domain identity authentication method, which comprises the following participants:(1) a cloud service provider group member CSP provides various cloud services for a user in a cloud environment, and verifies the identity of the user; (2) the user group member US accesses the cloudservice to complete a cross-domain identity authentication process of a cloud service provider; (3) the group administrator GM is responsible for joining group members and opening signatures so as totrack group member information; and (4) the group center GC initializes system parameters and issues a group member certificate, and the group administrator also participates in the group member certificate issuing process and simultaneously exposes group member identity responsibility. According to the method, identity authentication between the user and the cloud service provider under differenttrust domains is realized by utilizing the security of the group signature and the validity verification of the message, so that the user identity anonymity is ensured, and meanwhile, the user identity traceability is realized, and the cloud computing has higher security.
Owner:ZHENGZHOU NORMAL UNIV

Data sharing method and device based on federal data and federal service

The invention discloses a data sharing method and device based on federal data and federal service. The method comprises the following steps: receiving a model operation demand submitted by a data user; on the basis of the federated node capability database, generating an optimal decision result through matching according to model operation requirements; selecting a calculation model based on the optimal decision result, and sending the public key and the calculation model to a corresponding federated node; receiving a calculation result returned by the corresponding federated node, wherein the calculation result is obtained by calculation, through the federated node, based on the calculation model according to the federated data of the federated node and encryption through the public key; decrypting the result and returning to the data user; calculating the data revenue of each federated node participating in calculation, and providing the data revenue to a data provider; storing the calculation process data on an accounting node of the block chain; the data provider serving as a federal node. According to the invention, decision generation of demands of each data user is realized through a federation service mechanism, so that federation of services is realized.
Owner:数据堂(北京)科技股份有限公司

H5 non-login user session tracking method

ActiveCN110933078AImprove interception rateProtect information security and operational securityTransmissionEngineeringServer-side
The invention relates to an H5 non-login user session tracking method. the method comprises: a server adopting a two-layer architecture design; the server generating an entry link address for creatinga user session; wherein the address is an entrance of all subsequent H5 services; a request for accessing the address needing to be authenticated by the server; after the user session is successfullycreated, the server issuing a one-time token to the client; wherein the token is used for user identity confirmation in the subsequent request process, sending the token to the server side along withthe user request, the token being immediately invalid after the server side passes the verification, and then the server side creating a new token and issuing the new token to the user for the next request to confirm the identity of the user. Compared with the prior art, effective user login can be realized in a scene that a client browser cannot provide user password input or other identity authentication capabilities, the illegal request interception rate of malicious attackers can be improved, and the development cost and the maintenance cost are reduced.
Owner:BANK OF COMMUNICATIONS

Blockchain consensus method and device

ActiveCN111104678AResolve trust issuesSolve the problem of fair selection of accounting nodesFinanceDigital data protectionBlockchainConsensus method
The invention discloses a blockchain consensus method and a device. The method comprises the steps of determining a witness node; distributing a global key to each witness node based on a quantum keydistribution network; and selecting a node satisfying a preset condition from the witness nodes as an accounting node by using the global key and the transaction data. Due to the fact that all witnessnodes share the global secret key, the nodes meeting the preset conditions are selected through the global secret key, namely the accounting nodes are obtained through selection of the quantum lottery ticket mechanism, the trust problem of the witness nodes and the problem of fair selection of the accounting nodes in the witness nodes are solved on the basis of use of the quantum secret key.
Owner:北京国盾量子信息技术有限公司 +1

A traceability method of power battery cascade utilization based on block chain technology and a system thereof

The invention relates to a traceability method of power battery cascade utilization based on block chain technology and a system thereof. The method comprises the following steps: packaging the powerbattery information of the first shipment into a head block and adding the head block into the block chain, and broadcasting nationwide, wherein the power battery information comprises one or more ofa factory number, an information ID, a cell material, a nominal capacity, a nominal voltage, a charging cut-off voltage, a discharging cut-off voltage, a standard current, a maximum charging current,a maximum discharging current, a DC internal resistance, an operating temperature, a cell size, a weight, a number of cycles and a healthy state of the battery; when the power battery is traded, packaging the trading information of the power battery into a first trading block for broadcasting throughout the network, wherein all nodes in the network can verify its legitimacy and effectiveness, andthen adding the block into the block chain by a consensus mechanism. The invention realizes the functions of uploading, storing, inquiring, encrypting and decrypting the data of the whole battery supply chain, and the data is open, transparent, traceable and non-alterable.
Owner:深圳汽航院科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products