Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

35results about How to "Easy key management" patented technology

A mixed encryption method in session system

A mixed encryption scheme for a conference system is provided. The encrypting algorithm is that: before data communication, a message clear text is encrypted by using a DES method, and then the DES key is encrypted adopting an RSA method, so as to realize digital signature. By comprehensively using the existing encrypting algorithms DES and RSA, the strong points of which are utilized and the weak points are avoided. As the processing for main data adopts the DES encrypting algorithm, grouping processing for each datum can be completed in a very short time thanks to the fast speed of the DES encrypting algorithm; besides, the DES key encrypted by adopting the RSA algorithm can be publicized; therefore, the overall security system only requires few RSA decryption key. The mixed encryption scheme provided by the invention can not only give full play to the advantage of fast encrypting speed of the DES encrypting algorithm, but also give full play to the advantage of convenient management of the RSA algorithm; therefore, the mixed encryption scheme provided by the invention has the advantages of simple theory, fast speed and being easy to be realized; when being used in an instant communication system, the mixed encryption scheme can meet the requirement for real time and security of a conference system.
Owner:BEIHANG UNIV

Access authentication method, equipment and system of P2P (peer-to-peer) network

InactiveCN101815294ASimple access authentication workEasy encryption and decryptionNetwork topologiesTransmissionNetwork communicationPeer-to-peer
The invention discloses access authentication method, equipment and system of a P2P (peer-to-peer) network, belonging to the technical field of network communication. Network equipment in the P2P network is subjected to access authentication by adopting an identity-based public key IBC (Information Bearer Channel) mechanism. The method comprises the following steps of: receiving an access requesttransmitted by opposite terminal network equipment by home terminal network equipment; selecting a private key from the private keys of the home terminal network equipment as a conversation private key of the home terminal network equipment according to the private key level of the home terminal network equipment and the private key level of the opposite terminal network equipment; calculating a conversation main key of the home terminal network equipment according to the conversation private key of the home terminal network equipment, the identity information of the opposite terminal networkequipment corresponding to the conversation private key of the home terminal network equipment, a first negotiation parameter and a second random number determined by the home terminal network equipment; and returning an access response to the opposite terminal network equipment. By utilizing the IBC mechanism, distributed access authentication under the P2P network mode is solved, thus the IBC mechanism is particularly suitable for the P2P network.
Owner:HUAWEI TECH CO LTD

Key distribution method applicable to VOIP voice encryption

The invention discloses a key distribution method applicable to VOIP voice encryption, which is characterized in that a calling terminal initiates a session key application to a key distribution server (KDS) so as to trigger key distribution, the KDS generates a session key for a calling party and a called party and returns the session key to the calling terminal; the calling terminal initiates an encryption call to a called terminal through a VOIP server after acquiring the session key and sends key feature data generated by the KDS to the called terminal, and a media stream transmission channel is established between the calling party and the called party through the VOIP server; the calling party and the called party encrypt media streams by using the session key and send the encrypted media streams to each other, and the receiving parties decrypt the received data by using the session key so as to acquire the media streams. The key distribution method has the advantages that the key is directly generated by the KDS, thereby being easy to perform key management, and reducing adjustment and transformation for the VoIP server; the KDS performs identity verification on the calling party and the called party before the key is generated, thereby making up the vulnerability of identity authentication of an SIP (Session Initiation Protocol); one session is provided with one key, encryption is performed in the whole process, no plaintext appears in the transmission process, and the security is high.
Owner:BEIJING DATANG GOHIGH SOFTWARE TECH

Key aggregation encryption method capable of being revoked in cloud environment

ActiveCN106788988APerfect dynamic management functionEasy key managementKey distribution for secure communicationPlaintextCiphertext
The invention discloses a key aggregation encryption method capable of being revoked in a cloud environment. A user revocation supporting function is added on the basis of a key aggregation mechanism, and a user dynamic management function on the key aggregation mechanism is improved. According to the method, not only is user key management simplified, but also different decryption permissions are granted to different users. Ciphertext is updated through a cloud storage server to achieve user permission revocation; when one user is revoked, the legal users do not need to update a key, and therefore the burden of an authority is reduced; and the ciphertext can be verified and updated, and it is guaranteed that user revocation is effectively executed. Security proof shows that on the basis of a Weak DHDHE assumption, it proves that the proposed method achieves non-adaptive selection plaintext security under a standard model. Performance analysis shows that by means of the method, the length of the user key and the ciphertext is kept to be O(1), the length of systematic public parameters is kept to be O(log N), more efficient user revocation efficiency is achieved, and control over access permissions of the users is effectively achieved.
Owner:广州广信网络科技有限公司 +1

Method for registering and cancelling dynamic network organization devices

ActiveCN102932219AEasy key managementSave equipment resource and network resource overheadData switching by path configurationIp addressPassword
The invention relates to a method for registering and cancelling dynamic network organization devices. The method comprises the following steps: a device management server distributes an IP address, a user name and a password to each device in the network; an device user inputs the user names and passwords distributed by the device management server to the devices; the devices encrypt the user names and the passwords, and sends the encrypted user names and the passwords to the device management server; after receiving the encrypted user names and the passwords, the device management server performs decryption and comparison, and registration is realized after the comparison result is correct; the device management server checks on-network states of the registered devices; and the device management server automatically cancels out-of-network devices. According to the method, the device management server automatically checks the states of the on-network devices, so that the devices do not need to initiatively issue requests for registration and cancellation to the device management server, and the device management server can instantly acquire the on-network states of the devices and updates an on-network device list of each on-network device.
Owner:HISENSE BROADBAND MULTIMEDIA TECH

Remote proving method applicable to emergency rescue platform

The invention provides a remote proving method applicable to emergency rescue platform. The remote providing method comprises the steps that a proving terminal sends an identity authentication request to a cluster administrator; the cluster administrator verifies the identity of the proving terminal; if passing the verification, the proving terminal acquires measurement information of a platform where the proving terminal is positioned, signs the measurement information by adopting a cluster signing scheme and sends the signed measurement information to an inquiry terminal; the inquiry terminal verifies whether the signature is effective according to a cluster verification scheme and inquires whether the measurement information is credible from the cluster administrator; only if the signature is effective and the measurement information is credible, the inquiry terminal confirms that the proving terminal is credible. The remote proving method has the advantages that the problem of credibility proving of a terminal can be effectively resolved, and the authenticity of data and secure transmission of the data are guaranteed; meanwhile, the remote proving method has the characteristic of proving traceability, and identity forgery attack and malicious fraud attack can be effectively resisted.
Owner:BEIJING BUSINESS INTELLIGENCE & COMM TECH +1

ID cryptography-based anti-quantum computing group communication method and system

The invention provides an ID cryptography-based anti-quantum computing group communication method and system, and the method comprises the steps: distributing respective identity IDs and private keysto group members through an ID cryptography mechanism, enabling the group members to calculate the public keys of opposite sides through the public IDs of the opposite sides during communication, andthen calculating symmetric keys according to the private keys of the group members and the public keys of the opposite sides; achieving one-to-one communication with the opposite side; when the secretkey is updated, enabling an administrator to encrypt the updating secret key by using the symmetric secret key of each group member and send the updating secret key, enabling each group member to calculate the symmetric secret key with the administrator to obtain the updating secret key, and updating the symmetric secret key pool of the administrator by using the updating secret key according toa preset updating method. According to the invention, the symmetric key pool and the ID cryptography are combined, and the use security of the symmetric key pool is further enhanced in the scene of group communication.
Owner:南京如般量子科技有限公司 +1

Key seed matrix and certificateless anti-collision key generation method based on matrix

The invention discloses a key seed matrix and a certificateless anti-collision key generation method based on the key seed matrix. The key generation method comprises the following steps: a key generation center generating a 200-bit random number; calculating a public key of the equipment part according to the random number; the key generation center calculating a ZA value according to the equipment identifier and the public key seed matrix, and calculating a Z value according to the ZA value and the partial public key of the equipment; selecting and adding eight elements according to the coordinate of the Z value mapped to the private key seed matrix to obtain an equipment identification private key, and calculating an equipment identification public key according to the equipment identification private key; the key generation center calculating an equipment complete public key according to the equipment identification public key, and calculating an equipment complete private key according to the random number and the equipment identification private key; and after the complete equipment public key and the complete equipment private key are obtained, the key generation center issuing the key pair to the equipment end through the secure channel. According to the method, the advantages of a combined public key technology and a certificateless cryptosystem are combined, and the problems between the combined public key technology and the certificateless cryptosystem are solved.
Owner:鄂尔多斯市迪曼森密码科技有限公司

A Remote Attestation Method Applicable to Emergency Rescue Platform

The invention provides a remote proving method applicable to emergency rescue platform. The remote providing method comprises the steps that a proving terminal sends an identity authentication request to a cluster administrator; the cluster administrator verifies the identity of the proving terminal; if passing the verification, the proving terminal acquires measurement information of a platform where the proving terminal is positioned, signs the measurement information by adopting a cluster signing scheme and sends the signed measurement information to an inquiry terminal; the inquiry terminal verifies whether the signature is effective according to a cluster verification scheme and inquires whether the measurement information is credible from the cluster administrator; only if the signature is effective and the measurement information is credible, the inquiry terminal confirms that the proving terminal is credible. The remote proving method has the advantages that the problem of credibility proving of a terminal can be effectively resolved, and the authenticity of data and secure transmission of the data are guaranteed; meanwhile, the remote proving method has the characteristic of proving traceability, and identity forgery attack and malicious fraud attack can be effectively resisted.
Owner:BEIJING BUSINESS INTELLIGENCE & COMM TECH +1

Revocable Key Aggregation Encryption Method in Cloud Environment

ActiveCN106788988BPerfect dynamic management functionEasy key managementKey distribution for secure communicationPlaintextCiphertext
The invention discloses a key aggregation encryption method capable of being revoked in a cloud environment. A user revocation supporting function is added on the basis of a key aggregation mechanism, and a user dynamic management function on the key aggregation mechanism is improved. According to the method, not only is user key management simplified, but also different decryption permissions are granted to different users. Ciphertext is updated through a cloud storage server to achieve user permission revocation; when one user is revoked, the legal users do not need to update a key, and therefore the burden of an authority is reduced; and the ciphertext can be verified and updated, and it is guaranteed that user revocation is effectively executed. Security proof shows that on the basis of a Weak DHDHE assumption, it proves that the proposed method achieves non-adaptive selection plaintext security under a standard model. Performance analysis shows that by means of the method, the length of the user key and the ciphertext is kept to be O(1), the length of systematic public parameters is kept to be O(log N), more efficient user revocation efficiency is achieved, and control over access permissions of the users is effectively achieved.
Owner:广州广信网络科技有限公司 +1

Encoding Method of Chinese Character Cipher Based on Image Pixel Coordinates

The invention discloses a Chinese character password encoding method based on image pixel coordinates. The encryption process: (1) input a Chinese character string in plain text, and take out the string length K; (2) read the public key image f1 and the private key image f2 respectively, Generate the key image F, and take out the image size M×N; (3) Convert each Chinese character into binary data and divide it into high and low byte blocks, and store them in the cell arrays destr{i,1} and destr{ i, 2}; (4) cyclically search for the pixel values ​​matching the cell arrays destr{i,1} and destr{i,2} respectively in F, and read their pixel coordinates and store them in the two-dimensional matrix left[ x, y] and right[x, y]; (5) Randomly take out two coordinate values ​​in left[x, y] and right[x, y] to replace the high byte and low byte blocks of the Chinese character ; (6) 4 values ​​of these two coordinates are transposed by the agreed transposition order, and output in the four-dimensional matrix xyv[]; (7) when i=K, the encryption process ends, and the output K row four-dimensional matrix xyv[] ] is the ciphertext. The encryption method has the advantages of good confidentiality and flexible and convenient key management, and is a safe Chinese character password encoding method.
Owner:LIAONING UNIVERSITY

Access authentication method, equipment and system of P2P (peer-to-peer) network

InactiveCN101815294BSimple access authentication workEasy encryption and decryptionTransmissionNetwork communicationComputer science
The invention discloses access authentication method, equipment and system of a P2P (peer-to-peer) network, belonging to the technical field of network communication. Network equipment in the P2P network is subjected to access authentication by adopting an identity-based public key IBC (Information Bearer Channel) mechanism. The method comprises the following steps of: receiving an access requesttransmitted by opposite terminal network equipment by home terminal network equipment; selecting a private key from the private keys of the home terminal network equipment as a conversation private key of the home terminal network equipment according to the private key level of the home terminal network equipment and the private key level of the opposite terminal network equipment; calculating a conversation main key of the home terminal network equipment according to the conversation private key of the home terminal network equipment, the identity information of the opposite terminal networkequipment corresponding to the conversation private key of the home terminal network equipment, a first negotiation parameter and a second random number determined by the home terminal network equipment; and returning an access response to the opposite terminal network equipment. By utilizing the IBC mechanism, distributed access authentication under the P2P network mode is solved, thus the IBC mechanism is particularly suitable for the P2P network.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products