Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

112results about How to "Safe sharing" patented technology

Internet third-party authentication using electronic tickets

A method, software and apparatus facilitates one or more third-party agents to securely access a customer's or other first party's private personal and financial data or other such confidential information from a second party, preferably on the Internet. A security document or ticket is presented to the second party for verifying the customer's consent to grant such access to the third party. The second party only communicates such confidential information to the third party if the security document is found to be valid. The security document, which can be at least partially encrypted, can also include a preselected expiration time, beyond which it is not valid.
Owner:WELLS FARGO BANK NA

Method for constructing virtual environment trust

The invention discloses a virtual environment trust building method, which belongs to the trusted computing field in information security. The invention uses a single TPM to realize the trust of one or a plurality of virtual domains and comprises the following steps: firstly, measuring hardware, a virtual layer, a management virtual domain and one or a plurality of application virtual domains in turn by the TPM, realizing the trust of the application virtual domains, secondly, receiving and processing TPM command requests from each virtual domain, and establishing and maintaining TPM context for each virtual domain. The invention has the advantages that firstly, the platform safety and credibility are intensified through a complete trusted isolating mechanism, the trusted application service is better supported, and secondly, the safe sharing of each virtual domain to a trusted hardware root TPM is realized.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Cross-department ocean data sharing method based on block chain

ActiveCN109413174AFast data sharingImprove the efficiency of trust transferFinanceUser identity/authority verificationData sharingData processing
The invention discloses a cross-department ocean data sharing method based on a block chain. The method comprises the steps of according to an agreement negotiated by multiple users, generating an intelligent contract, and determining a consensus node; via the consensus node, deploying the intelligent contract into a P2P network of the block chain; receiving a data processing request of any oceandata department, authenticating and checking data requested by the data request, and generating a sharing list, wherein the any ocean data department belongs to one of the multiple users; storing thesharing list into a block chain account and diffusing the same; performing whole-network consensus on the sharing list and spreading to the whole network, and generating an overall sharing list; and based on the overall sharing list, sharing the ocean data across the departments. According to the method provided by the invention, by using the distributed computing nodes and accounts based on the block chain, the problem of cross-department sharing feasibility and security of the mass data is mainly solved.
Owner:CSSC SYST ENG RES INST

Portable device, a stationary device, a digital device and a method for performing secure communication using thereof

A method includes sensing an image of a portable device by using a camera unit, acquiring an orientation information estimation value of the portable device by using the sensed image, extracting key generation information for secure communication by using the orientation information estimation value, generating a secret key by using the extracted key generation information, and performing secure communication with the portable device by using the secret key.
Owner:INTELLECTUAL DISCOVERY CO LTD

Cryptography attribute-based access control method and system based on dynamic rule

The invention relates to a cryptography attribute-based access control method and system based on a dynamic rule, mainly belonging to the technical field of information. In the cryptography attribute-based access control system based on the dynamic rule, protected objects are stored in a encrypted form, and only the requests satisfying the requirements of access policies in the attribute-based access control can be authorized to decrypt the objects, therefore, it can be ensured that data in an unsafe environment can be accessed with authorization according to a security policy, and meanwhile,the extensibility of the policies and the dynamic acquisition of the attributes are also supported. The cryptography attribute-based access control method and system based on the dynamic rule are divorced from the traditional encryption system framework, and are a new attribute-based access control model, method and system supporting the cryptography decision. The cryptography attribute-based access control method and system based on the dynamic rule can achieve more secure, diversified, dynamic and flexible access authorization, which are suitable for large-scale organizations or informationsystems, and can be applied to the environments such as cloud computing, grid computing, distributed computing, and so on.
Owner:UNIV OF SCI & TECH BEIJING

Portable device and information management method

A portable device and an information management method are provided whereby personal information can be safely shared between two systems. Each entry of telephone directory information includes callee identification information identifying a callee to be called by mobile phone function and is readable from and updatable by an information processor. Use restriction information shows availability of each telephone directory information entry and includes read permission information indicating whether each telephone directory information entry can be read out or not. When a request to read out an entry of the telephone directory information is received from another information processor, a use restriction processor looks up the use restriction information corresponding to the requested entry of the telephone directory information and, if readout of the requested entry is permitted, permits the requested entry of the telephone directory information to be read out and provided to the information processor.
Owner:FUJITSU LTD

Big data intelligent government affair platform information management method

The invention discloses a big data intelligent government affair platform information management method. The method comprises the following steps of (1) establishing an infrastructure cloud platform;(2), establishing a core component of the data sharing exchange platform; (3) establishing a data cleaning fusion platform; (4) performing value comparison and logic relationship comparison on the data attributes of the same entity; (5) sharing various data acquired by the data sharing exchange platform with a city-level database; (6) discovering the value of various types of data generated and accumulated in the urban operation process through various mining algorithms and analysis tools; (7) performing data mining analysis; and step (8), establishing a middleware platform. The method supports docking with different levels of shared exchange platforms and government affair information resource directory systems, provides an open data access channel for governments, enterprises and citizens, and provides convenience for wider information sharing.
Owner:江西微博科技有限公司

Server, blockchain-based defrauding client information sharing method and medium

The invention relates to a blockchain technology, and discloses a server, a blockchain-based defrauding client information sharing method and a storage medium. The method comprises the following steps: after an application for uploading defrauding client information is received, calling a data verification intelligent contract initiating transaction, and verifying the defrauding client information; after the defrauding client information passes through the verification, signing an owner identifier of an uploader by using a digital certificate, and encrypting the defrauding client information;after an application of checking the defrauding client information is received, calling a data inquiry intelligent contract initiating transaction, extracting signature information corresponding to arequester in the transaction, acquiring authorization information, and verifying whether the requester is authorized to check the corresponding defrauding client information or not; and if YES, acquiring the corresponding encrypted defrauding client information, and decrypting the defrauding client information to acquire the defrauding client information. The blockchain-based defrauding client information sharing method realizes secure and controlled sharing of insurance defrauding data and can be comprehensively and effectively applied to anti-fraud identification.
Owner:PING AN TECH (SHENZHEN) CO LTD

Multifunctional network digital display equipment with novel structure and its operation method

The invention discloses a multifunctional network digital display device with novel structure and a working method thereof. The control circuit of the device consists of a main control chip of an embedded microprocessor, peripheral chips and devices, a power circuit, a display screen and other functional circuits. The device has multiple new, practical and convenient functions owning to the innovative hardware circuits and the application software: watch feeling comment is suggested on the screen and concrete watch feeling of users is detected and uploaded; digital images and related sound or text notes can be displayed simultaneously; the placing inclined angle is identified automatically and the digital images can be regulated correspondingly to achieve the best watching effect at the current inclination angle; light intensity of the environment is identified automatically and corresponding working mode is entered automatically according to the light intensity; mutual communication with a network server is triggered by an instant web surfing key on the device or a remote controller, etc. The device provides a digital terminal device with simple structure and convenient use for people, and the device can enrich and improve spiritual life of people.
Owner:纪全胜

Safe sharing method of intelligent contract medical image based on credit mechanism

The invention discloses a safe sharing method of an intelligent contract medical image based on a credit mechanism. The method comprises the following steps: 1), establishing a basic network: establishing a shared network based on blockchain technology through using an intelligent contract as an underlying application; 2), establishing network nodes: setting up independent nodes for the governmentdepartments, medical institutions, and patients in the blockchain shared network; 3), performing data sharing between nodes: enabling a government department to monitor the medical image sharing in real time through the blockchain network nodes, enabling a medical institution node to be responsible for the management and operation of the medical image as the main management node, and enabling a patient node to actively manage the sharing and data operation of the medical image. The purpose of the present invention is to break the information barrier between medical institutions, enhance the initiative of patients during the treatment, protect the privacy of patients during the sharing process, and protect and utilize medical resources through the characteristics of the blockchain networktechnology and intelligent contracts, which is conducive to the development of medical care.
Owner:XIANGTAN UNIV +1

Communication method and system between embedded type equipments

InactiveCN101141361AReal-time data communication and resource sharingReduce networking costsBus networksEmbedded systemIp address
The present invention provides a method and a system for the communication between the embedded devices based on Internet. The method comprises the following steps: a. a first equipment sends the networking request data for communication with a second equipment to a network server; wherein, the networking request data consists of the identification number of the first equipment and the identification number of the second equipment; the first equipment, the network server and the second equipment are connected through Internet; b. the network server judges the accuracy of the identification number of the first equipment and the identification number of the second equipment, and sends the response data to the first equipment in the condition of accuracy, and the response data consists of the IP address of the second equipment; c. the first equipment starts the communication with the second equipment according to the IP address of the second equipment.
Owner:METTLER TOLEDO CHANGZHOU SCALE & SYST +2

Conference information control system based on wireless network and control method thereof

The invention discloses a conference information control system based on a wireless network. First valid data is received and sent by a service terminal and encrypted and decrypted by main encryption and decryption equipment, and the first encrypted and decrypted valid data is communicated with a client terminal through the wireless network; and second valid data is received and sent by the client terminal and encrypted and decrypted by secondary encryption and decryption equipment, and the second encrypted and decrypted valid data is communicated with the service terminal through the wireless network. A network structure of the conference information control system is divided into an external network and an internal network, wherein the external network and the internal network are isolated by the main encryption and decryption equipment and the secondary encryption and decryption equipment, the internal network is a local wired network, and the external network is a wireless encryption network. An ARM (Advanced RISC Machine) chip is used as a network constructing core, so as to respectively construct the internal network and the external network, and network attack can be effectively avoided. An FPGA (Field Programmable Gate Array) chip is used as an encryption and decryption core, so that hardware encryption and physical isolation can be really realized, and information leakage caused by eavesdropping, recovering and the like can be effectively prevented.
Owner:JUNENG SPECIAL COMM EQUIP CO LTD TOEC GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products