Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

51results about How to "Achieve decryption" patented technology

Chip, data communication method for chip, consumable container and imaging equipment

The invention provides a chip of a consumable container, which comprises a storage module, a control module, an interface module and a data safety module. The storage module is used for storing initial data, printing data, control data and key data; the interface module is used for realizing data communication between the storage module and the control module; the data safety module is respectively connected with the interface module and the control module, and is used for identifying a type and a content of data communicated between a printer and the chip, encrypting matched data in a selected safe mode and decrypting the data; the control module is connected with the storage module and is used for controlling data communication between the chip and the printer and the access operation of the data of the storage module and external data and sending a corresponding control command to the chip according to a safety module processing result so as to realize data communication; and the same keys are stored in the printer and the chip. The invention also provides a data communication method for the chip, the consumable container with the chip structure, and imaging equipment with the consumable container. The safety of the communication data of the chip can be protected.
Owner:ZHUHAI TIANWEI TECH DEV CO LTD

Method for realizing security electronic mail based on digital envelope

The invention relates to the technical field of information security, and in particular relates to a method for realizing a security electronic mail based on a digital envelope. According to the invention, on the basis of the digital envelope technology based on PKI symmetric and asymmetric key algorithms, mail encryption and decryption information, user key information, data recovery information, mail ciphertext and other information are assembled into the digital envelope; and thus, encryption, decryption and data recovery of the electronic mail are realized. According to the invention, a session key is encrypted by obtaining all public key certificates of each receiver from a LDAP, such that interconnection and intercommunication of multiple certificates of one person are realized; when a mail blind copying function is started, mail information can be decrypted only by the private key of a blind copying user; therefore, the identity confidentiality of the blind copying user is ensured; in an emergency case that the private key of the user is lost or damaged, mail information can be decrypted without recovering the private key of the user through a KMC; and, by means of a high-grade security protection mechanism that the encrypted private key cannot be derived and a strict service approval signature mechanism, the security of recovered information is ensured from the perspectives of technologies and management.
Owner:BC P INC CHINA NAT PETROLEUM CORP +2

Hierarchical access control system and method for supporting data sharing in cloud storage

The invention belongs to the technical field of protection of data access through a platform, and discloses a hierarchical access control system and method for supporting data sharing in cloud storage. The hierarchical access control method for supporting data sharing in cloud storage comprises: a trusted authorization centre generates system secret information and public information, and opens the system public information to users; according to a user group grade structure, the trusted authorization centre generates the secret key of each user group based on a secret key aggregation method,and distributes secret keys to all the corresponding users; the users encrypt data to be shared by utilizing the system public information of any target user group, and upload and store the data in acloud server; valid users obtain ciphertext data stored in the cloud server, and decrypt the data by utilizing a user group secret key; and, when the access permission of a certain user needs to be repealed, the trusted authorization centre and the cloud server perform a system updating and re-encrypting process. According to the hierarchical access control system and method for supporting data sharing in cloud storage disclosed by the invention, oriented towards a cloud storage environment, hierarchical access control supporting flexible data security sharing and without a secret key deduction process in a public key cryptography system can be realized.
Owner:XIDIAN UNIV

DNA self-assembling structure and symmetrical encryption system based on DNA self-assembling structure

The invention relates to a DNA self-assembling structure and a symmetrical encryption system based on the DNA self-assembling structure. The DNA self-assembling structure comprises a bubble structure and is formed by a DNA nano structure and a chain Q through base pairing. The DNA nano structure is formed by a DNA chain AB and a BHQ chain in a hybridization mode. The huge parallelism capacity and the large-scale information searching and single-molecular recognizing capacities of DNA are utilized, inherent advantages of finishing information converting, transmitting and detecting through different detecting methods utilized in the complex biology body are possessed, and then the encryption and decryption in the stream encryption method are achieved based on difficulty of the nano technology in the large scale information searching and the DNA self-assembling structure. According to the symmetrical encryption system, the AB chain specific recognition area and the chain converting technology are adopted, xor operation is achieved, one-time pad information encryption and decryption are achieved, and therefore passwords can be hard to crack, and information storing and conveying safety is improved. The DNA self-assembling structure and the symmetrical encryption system based on the DNA self-assembling structure can be widely applied various password fields.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Method, system and device for achieving credible digital identity decryption and signature verification through software library

The invention relates to a method for realizing trusted digital identity signature verification and decryption by using a software library and a system and equipment for realizing the method, and themethod comprises the following steps: (1) compiling software with the software library, and setting a secret key required by trusted digital identity reading in the software library, so that the software has signature verification and decryption functions; (2) downloading the software into equipment for scanning the net certificate two-dimensional code, so that the equipment has trusted digital identity verification and decryption functions; (3) the equipment scanning the net certificate two-dimensional code which is issued by the trusted digital identity platform and contains citizen identitydata, and receiving and acquiring the trusted digital identity data; (4) software in the equipment calling a software library to perform signature verification and decryption on the received credibledigital identity data; and (5) after the software library signature verification and decryption operation is finished, returning a verification result to the software and outputting the verificationresult by the equipment.
Owner:新大陆(福建)公共服务有限公司

Mobile terminal capable of encrypting voice information and encryption method thereof

The invention discloses a mobile terminal capable of encrypting voice information and an encryption method thereof. The mobile terminal comprises an encryption and decryption module, a first mobile phone communication module and a second mobile phone communication module. In the invention, voice information acquired by a microphone is encrypted through the encryption and decryption module; the encrypted voice information is transmitted to the first mobile phone communication module; the first mobile phone communication module transmits the voice information to another mobile terminal communicating with the mobile terminal; and the encryption and decryption module also transmits a secret key to another mobile terminal through the second mobile phone communication module. According to the invention, separate transmission of secrete keys of the voice information is realized; the encryption security is improved; after the secret key and the voice information output by another mobile terminal are received, the voice information is encrypted through the encryption and decryption module; therefore, decryption of the voice information is realized; even though any channel of two communicating mobile terminals is monitored, a monitor cannot obtain all information; and thus, the encryption security is improved.
Owner:深圳市创百智能科技有限公司 +1

Electro-optic phase mutual modulation chaotic multichannel one-way secret communication system

The invention discloses an electro-optic phase mutual modulation chaotic multichannel one-way secret communication system. Four chaotic lasers at a sending end generate four paths of chaotic signals, the chaotic signals are converted into radio-frequency electric signals through a photoelectric detector, and the radio-frequency electric signals are transmitted to corresponding phase modulators to perform phase modulation on optical signals in corresponding optical paths to generate phase chaotic signals. Four paths of phase chaotic signals are converted to different wavelengths through a wavelength converter and are combined into one path through a wavelength division multiplexer to be transmitted to a receiving end, the wavelength division multiplexer at the receiving end divides the signals into four paths, the signals are converted to the same wavelength through the wavelength converter, and the four paths of signals are respectively converted into radio frequency electric signals through corresponding photoelectric detectors, and the optical signals of the corresponding optical paths are subjected to phase modulation through the phase modulator; reverse phase chaos is generated, phase chaos of the optical path signals is counteracted, intensity chaos signals are generated, and the robustness of the intensity chaos is used for decrypting the multiple paths of signals. Multi-channel chaotic synchronous communication is realized, and the confidentiality is high.
Owner:HANGZHOU DIANZI UNIV

Remote control method and system of access control equipment and storage medium

The invention discloses a remote control method and system of access control equipment and a storage medium. The method comprises the following steps that an access control management terminal sends aremote command to a command issuing transit server; the command issuing transit server obtains a first secret key, a second secret key and an encryption protocol from a first secret key issuing server, a second secret key issuing server and an encryption protocol issuing server respectively; the command issuing transit server encrypts the remote command according to the encryption protocol, the first secret key and the second secret key to obtain an encrypted remote command, and sends the encrypted remote command to access control equipment; and the access control equipment acquires the encryption protocol, the first secret key and the second secret key from an encryption management client, decrypts the encrypted remote command based on the acquired encryption protocol, the first secret key and the second secret key to obtain a decrypted command, and analyzes the decrypted command based on a preset command analysis engine. By utilizing the technical scheme provided by the invention, the remote control function of the access control equipment can be enriched, and the data security is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

A high-speed chaotic secure transmission method based on coherent detection

The invention discloses a high-speed chaotic secure transmission method based on coherent detection, specifically: at the transmitting end of the chaotic secure transmission system, the optical chaotic carrier and the transmission information are optically coupled through an orthogonal basis, and through the noise-like characteristics of the chaotic carrier Cover the transmission information to obtain the chaotic cover signal; add phase fast perturbation and polarization fast perturbation, and then enter the optical fiber transmission link for transmission; at the receiving end, use coherent detection technology to obtain the chaotic cover signal, and compensate the linearity by digital signal processing And nonlinear effects, and then through the chaotic decryption algorithm based on the polarization orthogonal basis or the chaotic decryption algorithm based on the phase orthogonal basis, finally realize the separation of the chaotic carrier and signal to complete the decryption operation. The present invention can realize long-distance transmission and decryption of high-speed chaotic secret signal in multiple transmission services, multiple transmission wavelengths, multiple fiber cores, multiple modes, and high-speed secure communication transmission system.
Owner:SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products