Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

84results about How to "Easy to decrypt" patented technology

Key negotiation method and device, and power distribution automatic system

The invention discloses a key negotiation method applied to a power distribution main station of a distribution automatic system, which can obtain the identity label and random number of the power distribution terminal after the two-way identity authentication is completed, and generates a working key according to the identity label, the random number and the root key and sends a control instruction encrypted with the working key to the power distribution terminal, so that the power distribution terminal decrypts the control instruction and returns response information to complete key negotiation. It can be seen that the working key in the present invention is generated according to the identity label and the random number; in different session processes, the random number is different, sothe working key is also different and is not easy for the illegal personnel to crack, thereby greatly improving the safety of the distribution automatic system. Correspondingly, the present inventionalso provides a key negotiation device, a key negotiation method and device applied to the power distribution terminal, and a power distribution automatic system, the functions of which correspond tothe functions of the aforementioned method.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD

Data sending method, data receiving method, sending end and receiving end

The invention provides a data sending method, a data receiving method, a sending end and a receiving end, and relates to the technical field of communication. The sending method comprises the following steps: calculating to-be-sent data by utilizing a message digest algorithm to obtain a first hashed value of the to-be-sent data, splicing the length value of the to-be-sent data to the head and/orthe tail of the to-be-sent data to obtain to-be-encrypted data, encrypting the to-be-encrypted data to obtain first encrypted data, dividing the first hashed value into a plurality of pieces of firstsub-data at an interval of every a second preset number of characters, splicing one piece of first sub-data to the head and/or the tail of a group of to-be-inserted characters to obtain a group of preset characters, sequentially inserting a group of preset characters into the first encrypted data at intervals of a fifth preset number of characters to obtain second encrypted data, and splicing allcharacters of the first hashed value at the head and/or the tail of the second encrypted data to obtain target encrypted data. The data transmission security performance is high, and whether the target encrypted data is tampered or not can be conveniently verified.
Owner:新奇点智能科技集团有限公司

BGV type multi-key fully homomorphic encryption method with directional decryption function

The invention belongs to the field of information security and privacy protection, and particularly relates to a BGV type multi-key fully homomorphic encryption method with a directional decryption function, which comprises the following steps that different users use BGV type homomorphic encryption on plaintext data of themselves to obtain ciphertext corresponding to different keys; user extension is performed on the ciphertext participating in homomorphic calculation to obtain an extended ciphertext of a set (user set S) composed of all users participating in homomorphic calculation; homomorphic operation is performed on the extended ciphertext of the user set S participating in calculation to obtain a result ciphertext; the users participating in calculation carry out directional partial decryption on the result ciphertext respectively, and send partial decryption results to the users needing to be decrypted finally; and a decrypted user is appointed to carry out final decryption toobtain a plaintext result of homomorphic calculation. According to the method, the controllability of the ciphertext decryption result is enhanced, the limitation that MPC related technologies need to be used in the ciphertext broadcasting process is eliminated, and the complexity of the decryption result is reduced.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Approval signature verifying method, mobile device, terminal device and system

The invention discloses an approval signature verifying method, a mobile device, a terminal device and a system and belongs to the technical field of communication. The method comprises the following steps: the terminal device is used for encrypting approval information via anyone of an approver gesture information, a first hand-written signature, first voiceprint information and first fingerprint information which are pre-stored; the mobile terminal obtains decryption information input via an approver, encrypted approval information is decrypted according to the decryption information, the mobile terminal obtains an approver-input signature on the approval information and verifies the signature after the approval information is successfully decrypted, and successful verification information is sent to the terminal device after the signature is successfully verified. The decryption information is obtained via the mobile device, the signature on the approval information is obtained, the approver can complete approval procedures via the mobile device, approving efficiency is improved, a problem that waiting is caused due to failure to complete the approval procedures timely when the approver is on a business trip or cannot have convenient access to the terminal device, and user experience is improved.
Owner:KMERIT SUZHOU INFORMATION SCI & TECH CO LTD

Certificate-based end-to-end key exchange method

The invention discloses a certificate-based end-to-end key exchange method. The method comprises the following steps: first step, a terminal I obtains a public key of a terminal II, wherein the specific process is as follows: A1, the terminal I encrypts the public key and submits the same to a server; A2, the server decrypts the public key encrypted by the terminal I, a digital certificate authentication center creates a user certificate of the terminal I, and the server stores the user certificate of the terminal I; A3, the terminal I generates a request message for key exchange with the terminal II; A4, the server sends the user certificate of the terminal I to the terminal II, and after the terminal II agrees to the key exchange request, the server sends the user certificate of the terminal II to the terminal I; A5, the terminal I parses the public key of the terminal II from the user certificate of the terminal I and stores and the same. Similarly, the terminal II acquires the public key of terminal 1. By adoption of the certificate-based end-to-end key exchange method, the key exchange process is simplified, the man-in-the-middle attacks and replay attacks in the registrationprocess are prevented, and the security of the public key is improved.
Owner:河南芯盾网安科技发展有限公司

Embedded device firmware security upgrading method and system, terminal and storage medium

The invention provides an embedded device firmware security upgrading method and system, a terminal and a storage medium, and the embedded device firmware security upgrading method comprises the steps: setting an encryption algorithm library, and storing a plurality of encryption algorithms in the encryption algorithm library; randomly selecting an encryption algorithm from the encryption algorithm library as a primary encryption algorithm to perform primary encryption on an upgrade file, and encoding and packaging the primary encryption file and the primary encryption algorithm into a temporary file; randomly selecting an encryption algorithm from the encryption algorithm library as a secondary encryption algorithm to encrypt the temporary file, and encoding and packaging the encrypted file and the secondary encryption algorithm into an encrypted upgrade file; and sending the encrypted upgrading file to a terminal to which embedded equipment to be upgraded belongs, wherein the encrypted upgrading file is decrypted and decompressed by the terminal and then burnt to the embedded equipment to be upgraded. According to the embedded device firmware security upgrading method and system,the security of the firmware upgrading file can be improved, so that the security upgrading of the firmware of the embedded equipment is realized.
Owner:青岛海米飞驰智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products