Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

53 results about "Trusted path" patented technology

A trusted path or trusted channel is a mechanism that provides confidence that the user is communicating with what the user intended to communicate with, ensuring that attackers can't intercept or modify whatever information is being communicated.

Method of providing assured transactions using secure transaction appliance and watermark verification

Disclosed is a method of improving electronic security by establishing a path between a user and a secure transaction appliance. The secure transaction appliance receiving information destined for the user which includes a tagged portion, said tagged portion triggering the secure transaction appliance to forward the information to the computer from which the request was issued, and to seeking an electronic signature to verify the content or transaction by transmitting a watermark, tagged portion of the content, or similar electronic content. The secure trusted path providing the user with the tagged portion incorporating additional elements such as a watermark, or in some embodiments only the additional elements, upon a personalized security device associated with the user making interception or manipulation more complex and difficult.
Owner:DATA LOCKER INC

System and method for trusted communication

A method of establishing a trusted path of data and a method of verifying the integrity of data presented for signing to a user of the personalized device in a public-key cryptographic scheme. The method comprises establishing a trusted path between the user and secure module residing on the personalized device. The secure module holds the user's private key, displays information about the data message directly to the user, and generates the signature only when instructed to do so. The decision whether or not to sign the data message is determined by the user.
Owner:MALIKIE INNOVATIONS LTD

Trust-based on-demand multipath vector routing algorithm of Ad Hoc network

The invention discloses a trust-based on-demand multipath vector routing algorithm of an Ad Hoc network The trust-based on-demand multipath vector algorithm of the Ad Hoc network includes that simple and practical credible theories are utilized to improve and expand an AOMDV (Ad Hoc On-demand Multipath Distance Vector) routing protocol, and the packet loss rate is used as a measurement of credibility to establish a credible multipath, so that the data transfer rate is greatly increased. Meanwhile, the path maintenance system is added based on the original route maintenance, and the original route error broadcast is changed to the wrong path unicast, so that the maintenance overhead of trusted paths is reduced. According to the Ad Hoc network trust-based on-demand multipath vector routing algorithm, a balance is found between the transmission rate and the network overhead, and the quality of service is substantially improved due to the fact that the trust-based on-demand multipath vector routing algorithm of the Ad Hoc network is verified by an NS2 simulation testing and a field testing.
Owner:SHANDONG UNIV

Software-defined Internet of Things network topology data transmission security management method and system

The invention provides a software-defined Internet of Things network topology data transmission security management method and system, and the method comprises the steps: deploying common nodes and aggregation nodes at Internet of Things network nodes, and enabling the nodes to communicate with each other; performing encryption algorithm configuration on common nodes and aggregation nodes; each adjacent node performing bidirectional identity authentication and key agreement, and each node recording credible nodes passing authentication around itself and suspicious nodes failing to be authenticated; periodically executing topology discovery, collecting topology information of common nodes by the aggregation nodes, forwarding messages of trusted nodes among the aggregation nodes, establishing a trusted path, and constructing a global topology view; sequentially forwarding and aggregating the topology state messages according to the determined trusted path; and determining newly added nodes and malicious nodes based on the global topology view, broadcasting, and updating the network topology structure of the Internet of Things. According to the invention, the security and reliabilityof data transmission can be effectively improved.
Owner:ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1

Layered PCE based multi-domain optical network secure light path establishment protocol

The invention discloses a layered PCE based multi-domain optical network secure light path establishment protocol. Aiming at the problems of security problem and comprehensive efficiency existing in a multi-domain optical network light path establishment process, a new GO-PCE (Global Optimizing secure light-path protocol based PCE in multi-domain optical network) is designed by combining with a trust model and a key management scheme, adopting a globally optimized multi-domain trusted path selection, usable wavelength calculation and wavelength distribution strategy, and utilizing a TLS based bidirectional identity authentication, TCP-AO based source authentication, identity cryptography based encryption and digital signature technology and a Path-Key based privacy protection mechanism. The secure service requirements such as confidentiality, completeness, authenticity, non-repudiation, freshness and privacy can be met; compared with an SD-PCE and pH-PCE light path establishment protocols, the layered PCE based multi-domain optical network secure light path establishment protocol has relatively low blocking rate and relatively short light path establishment time delay.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Dynamic measurement method and system for sensitive application in multiple secure environments

The invention relates to a dynamic measurement method and system for sensitive application in multiple secure environments. According to the method, program source code is subjected to static analysisto generate a function calling graph and each function control flow graph so as to build a trusted path feature set; the program source code is subjected to pile pitching preprocessing; the obtaineddynamic path is separated in a security domain; a function calling sub graph and a function control flow sub graph are obtained; the security domain is used for matching the function calling sub graphwith the function calling graph; the function calling sub graph is enabled to be a sub graph of the function calling graph; and then, the security domain is used for matching the function control flow sub graph with the function control flow graph. The dynamic measurement is performed on the execution completeness of the sensitive application in the trusted path execution process, and the programis enabled to be executed on the trusted path in sequence.
Owner:INST OF INFORMATION ENG CAS

Embedded variable-granularity control flow verification method and system based on probability prediction

InactiveCN110276198ADetect attackBalance efficiencyPlatform integrity maintainanceComputer hardwareFeature set
The invention relates to an embedded variable-granularity control flow verification method and system based on probability prediction. The embedded variable-granularity control flow verification method is divided into a verification end and a certification end. The method comprise: constructing a trusted path feature set, carrying out vulnerability probability prediction on each function in the target source program, carrying out coarse-fine granularity instrumentation preprocessing on the functions, obtaining all possible dynamic control flow graphs of the target program by using different inputs in a verification end, and replacing and storing the control flow graphs in a database by using Hash values; collecting a dynamic path, the proving end running the processed target program after receiving the request sent by the verification end, and calculating the hash value of the control flow graph in the security world and signing; when the dynamic path is checked, the proving end sending a signature to the verifying end, the verifying end matching a Hash value obtained by decrypting the signature in a database, if the Hash value can be matched, the control flow running at the time being complete, and otherwise, the integrity of the control flow being damaged.
Owner:INST OF INFORMATION ENG CAS

Method, apparatus and system for controlling access to computer platform resources

A manageability engine, and / or operations thereof, for controlling access to one or more resources of a computer device. In an embodiment, the manageability engine executes an authentication agent to perform authentication of a local user of a computer platform which includes the manageability engine. In another embodiment, the manageability engine includes a device driver to control an input / output device for the local user to exchange an authentication factor via a trusted path between the input / output device and the manageability engine.
Owner:INTEL CORP

Collaborative filtering recommendation method based on optimal trust path

The invention discloses a collaborative filtering recommendation method based on an optimal trust path, which is improved by aiming at a traditional collaborative filtering algorithm and a trust fusion collaborative filtering algorithm, and comprises the following steps of: firstly, constructing a trust network of users, calculating trust degrees among the users, and calculating interest similarity among the users; calculating the comprehensive similarity among the users by combining the trust degree among the users and the interest similarity among the users; obtaining a nearest neighbor setaccording to the comprehensive similarity among the users; and finally predicting the score of the target user to the project to obtain a project recommendation result. According to the method, a global user is considered during calculation; a multi-path trust degree algorithm is provided on the basis of the fused trust recommendation algorithm; the optimal path is selected from multiple trust paths to represent the path trust degree between two users, the trust weight relationship contained in the path is considered, the recommendation accuracy and the operation efficiency of the algorithm are improved, and the operation time of the algorithm is about 1 / 4 of the operation time of the existing fusion trust recommendation algorithm.
Owner:GUANGDONG POLYTECHNIC NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products