Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

50results about How to "Decryption implementation" patented technology

Encryption and decryption method, device and system

The embodiment of the invention provides an encryption and decryption method, device and system, aiming to at least solve the problem that the verification between initiating end equipment and response end equipment cannot be performed under an existing AES-SIV mechanism in the case that the initiating end equipment does not know an MAC address of the response end equipment in advance. The methodincludes the following steps: enabling first equipment to acquire a first public key of second equipment; generating a first key and a first public key hash value at least according to the first public key of the second equipment; generating a first vector at least according to a preset MAC address and an MAC address of the first equipment; encrypting a first plaintext at least according to the first key and the first vector to generate a first ciphertext; sending a first message to the second equipment, or sending a second message to third equipment, and enabling the third equipment to send athird message to the second equipment, wherein the first message or the second message or the third message at least includes the first ciphertext, the first public key hash value and a first publickey of the first equipment; or, the scheme of the invention is applicable to the field of communication.
Owner:HONOR DEVICE CO LTD

SSL/TLS network encryption communication information real-time decryption method based on memory analysis

The invention discloses an SSL / TLS network encryption communication information real-time decryption method based on memory analysis. The method comprises the following steps: monitoring a network encryption communication session key generation function and an encryption communication session ID generation function by using a process injection technology and an API Hook technology through an Agentto obtain an encryption communication session ID and a corresponding encryption key; obtaining a local IP address of the client through the Agent; encrypting the acquired encryption communication session ID, the network encryption communication session key and the local IP address of the client through a temporarily generated symmetric encryption key, and sending the encrypted data to a network decryption end; and after receiving the encrypted data, obtaining a local IP address of the client, the encryption communication session ID and a decryption key of the corresponding session, and decrypting and storing the corresponding network encryption communication session in real time. According to the invention, the extraction of the network communication encryption key and the real-time decryption of the network encryption communication content can be effectively realized, and the detection efficiency is improved.
Owner:成都安舟信息技术有限公司

Portrait biological characteristic privacy protection and decryption method

The invention discloses a portrait biological characteristic privacy protection and decryption method. The method comprises the following steps: constructing and training a portrait encryption and keygeneration network model, extracting portraits and corresponding identity information as input of the network model according to annotation information of a face database, and training a designed network by utilizing constructed data to finally obtain network model weights; actual portrait encryption and key storage: performing encryption and key generation on the actually acquired portrait by using the network model, and separately storing the encrypted portrait and the key; and decrypting the encrypted portrait, and cooperatively processing a decryption task of the user by the cloud serveraccording to a decryption demand of the user side. According to the method, a deep learning network technology is applied to portrait encryption to generate encrypted portraits with similar visual effects; the encrypted portrait and the secret key are stored separately, and the user is assisted to decode the portrait in a cloud cooperative processing mode, so that the possibility of information leakage can be reduced, and rapid decryption of the user is realized.
Owner:SOUTH CHINA UNIV OF TECH

Method and device and system for encrypting and decrypting media content

The invention discloses a method and device and system for encrypting and decrypting media content, and relates to the field of data encrypting and decrypting operation. The requirement for encrypting and decrypting operation with a segment as a unit can be met. The encrypting and decrypting method includes the steps that in the encrypting process, the media content is encrypted with the segment as the unit, an encryption key of the encrypted segment is stored in the head portion added for the media content segment, and the encryption key and the encrypted media content segment are sent out together. When a decryption end receives part of media content of the whole or segmental protected media content formed by the encrypted media content segment and the head portion, the position of the received media content in the corresponding protected media content segment is analyzed and determined, a decryption key of the corresponding received media content segment is obtained according to position information, and the encrypted media content segment of the received media content is decrypted according to the decryption key. The method and device and system for encrypting and decrypting the media content is mainly applied to encrypting and decrypting process of the media content with the segment as the unit.
Owner:HUAWEI TECH CO LTD

Information encryption algorithm, information encryption device, information decryption algorithm, information decryption device and communication method

The invention is applicable to the technical field of blockchains, and relates to an information encryption algorithm, an information encryption device, an information decryption algorithm, an information decryption device, and a communication method. The information encryption algorithm comprises the following steps of: encrypting to-be-encrypted data according to a hash value of a random numberto generate first encrypted data; encrypting the hash value of the random number according to a preset first user private key and a preset second user public key to generate second encrypted data; andcombining the first encrypted data with the second encrypted data to generate final encrypted data. According to the information encryption algorithm provided by the invention, only a first user public key and a second user private key can be used for decrypting the second encrypted data and acquiring the hash value of the random number for decrypting the to-be-encrypted data, thereby realizing decryption of the encrypted data; and the second user private key is only owned by a second user serving as an information receiving end, so that the security of communication information is effectively ensured.
Owner:刘佳

Dynamic multi-party signature encryption and decryption method and system

The invention discloses a dynamic multi-party signature encryption and decryption method and system, and the method comprises the following steps: receiving a multi-party encryption request which is a request that a plurality of users carry out the common encryption of the same transaction information; and calling a dynamic multi-party signature contract pre-deployed on the block chain, verifying a signature of the multi-party encryption request, after verification is passed, obtaining on-chain public keys of a plurality of users by the dynamic multi-party signature contract, establishing a multi-party signature function to generate a multi-party encryption character string, and performing common encryption on the transaction information through the multi-party encryption character string, wherein any one on-chain private key or multiple on-chain private keys or all on-chain private keys in the multiple users are input into the multi-party signature function to be restored to obtain a multi-party encrypted character string so as to decrypt the transaction information. The technical problem that transaction information encryption and decryption are inflexible and limited is solved, and the method has the technical characteristics of multi-user encryption and decryption, dynamic and adjustable encryption and decryption, wide application scene, convenience in auditing, safety and reliability.
Owner:上海简苏网络科技有限公司

Video encryption method and decryption method based on multi-projector splicing and fusion

The invention belongs to the field of video encryption, particularly relates to a film encryption method and a film decryption method based on multi-projector splicing fusion, and aims at providing afilm source encryption and decryption technology for solving a problem of movie copyright protection. The method comprises the following steps of (1) carrying out parameterized division on a projection curtain, and selecting an encryption area; (2) generating a password on a target machine by using encryption software; (3) converting the password into a binary number, and selecting the front n bits of the binary number to generate a film encryption mask; (4) overlapping a watermark mask to generate an encrypted film in a process of rendering the generated film; (5) during a playing step, calling the same encryption program, generating a password which is the same as the encryption, converting the password into a binary array, and generating a splicing fusion decryption configuration parameter; and (6) calling the decryption configuration parameter by splicing fusion software and playing the encrypted film source in order to realize decrypted playing. According to the film encryption method and the film decryption method based on the multi-projector splicing fusion, an encryption technology for a multi-projector special curtain splicing fusion film is realized.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products