Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

54results about How to "Effective encryption" patented technology

Encryption method and system of mobile instant message

The invention belongs to the technical field of instant messages and discloses an encryption method of a mobile instant message. The encryption method comprises the steps that the instant message is encrypted by a random number R; the random number R is encrypted by a public key of a password server simultaneously; the password server decrypts the random number R with a private key of the password server and encrypts the random number R with a public key of a mobile terminal of a receiver; the instant message and the random number are sent to the mobile terminal of the receiver; the mobile terminal of the receiver decrypts the random number R with a private key of the mobile terminal, and then decrypts the instant message with R; and the instant message is received and displayed. The instant message is encrypted by the random number R, and the private key R is encrypted during transmission. Confidentiality of the instant message is strengthened. Meanwhile, all password processing such as matching of a user identity with a password, and password conversion are performed on a server with higher processing capacity, so that the terminal burden is reduced, and the purposes of ensuring message transmission security and reducing the computation of the terminal are achieved. In addition, an additional communication flow is not required to be added between the terminal and the server when the encrypted message is transmitted, so that the limited wireless broadband resource is saved.
Owner:成都三零瑞通移动通信有限公司

Remote compelled method and system for mobile terminal equipment and computer

InactiveCN102594893AEasy remote controlEfficient and safe remote controlTransmissionComputer hardwareUser input
The invention provides a remote compelled method for mobile terminal equipment and a computer. The remote compelled method is characterized by comprising the following steps that: the mobile terminal equipment and the computer respectively store a control instruction corresponding to a concrete operation; a user sets an identification code (for identifying a master control end) and an operation authority (corresponding to the identification code) at a controlled end, wherein the operation authority can be implemented by the control instruction stored in the master control end; the user inputs the identification code at the maser control end and sends the identification code to the controlled end; the controlled end carries out verification on the identification code sent by the master control end, and if the sent identification code is not consistent with a local preset identification code according to a verified result, the controlled end sends an error code signal to the maser control end, and waits that the maser control end sends an identification code again; and if the sent identification code is consistent with the local preset identification code according to the verified result, a corresponding control instruction is loaded in the controlled end, and the controlled end sends the operation authority and local state information to the master control end.
Owner:GUANGDONG BUBUGAO ELECTRONICS IND

Wiring board power supply system based on fingerprint authentication function

InactiveCN104821470ASolve the problem that user authentication cannot be performedRealize power supply controlCoupling device detailsComputer hardwareControl circuit
The invention discloses a wiring board power supply system based on a fingerprint authentication function. The system comprises jacks and a control circuit board, and further comprises a fingerprint authentication device and a relay, wherein the input end of the relay is connected with the fingerprint authentication device, and the output end of the relay is connected with the jacks. The fingerprint authentication device comprises a fingerprint extraction module, a fingerprint parsing module, a processing module, a storage module, a fingerprint matching module and a driving module, wherein the fingerprint extraction module is used for registering fingerprints; the fingerprint parsing module is used for parsing obtained fingerprint information; the processing module is used for obtaining user fingerprint images through combination with processing; the storage module is used for storing the user fingerprint images therein; the fingerprint matching module is used for performing matching with the user fingerprint images; and the driving module is used for outputting driving signals for the relay according to match results and supplying power to the jacks in case of closure or cutting off the power of the jacks in case of breaks. The wiring board power supply system based on the fingerprint authentication function can realize power supply control of a wiring board by users, facilitates management and realizes power supply in an intelligent mode.
Owner:WUXI CITY CHONGAN DISTRICT TECH ENTREPRENEURSHIP SERVICE CENT

Intelligent power distribution terminal based on ad-hoc network wireless communication

The invention discloses an intelligent power distribution terminal based on ad-hoc network wireless communication. The terminal is used for connecting an external wireless router in a communication connection mode. The external wireless router is coupled to a power-distribution main station system through an optical fiber Ethernet. The terminal comprises a wireless communication module, a signal acquisition module, a data processing module and a safe access module. The safe access module comprises a certificate module and a signature module. The signature module is coupled to the data processing module and the wireless communication module. A main-station private key is stored in the external wireless router. By using the intelligent power distribution terminal based on the ad-hoc network wireless communication, through arranging the signal acquisition module, the data processing module and the wireless communication module, signals of a power grid can be effectively collected and transmitted into the power-distribution main station system; and through arranging the safe access module, the signal which is transmitted wirelessly is effectively encrypted so that safety of a message of an application layer is effectively increased.
Owner:WENZHOU ELECTRIC POWER BUREAU +2

Self-recovery image encryption and decryption method combining zero watermarks and block classification fusion

The invention provides a self-recovery image encryption and decryption method combining zero watermarks and block classification fusion. During encryption, first, small blocks are divided into four types according to a frequency domain alternation coefficient of the small blocks in an image to be encrypted, and corresponding alternating current and direct current coefficients are reserved to serve as a restoration reference matrix; second, main information of the small blocks which are scrambled in position and auxiliary information of an original position reference matrix are fused, and authentication information of the fused small blocks is acquired according to an encoding matrix; third, direct current components and the block types of the scrambled small blocks before fusion and the authentication information of the fused small blocks are used as the zero watermarks stored in a third public trust party; and last, the image is reconstructed from the fused small blocks, and global position scrambling is performed to generate an encrypted image. During recovery, first, the fused small blocks are reconstructed, the main information and auxiliary information authentication relation and zero watermark recovery main information are utilized, and a decrypted image is reconstructed. Compared with existing methods, the method can be used for effectively encrypting the image and performing a certain recovery against a channel attack, thereby having higher application value.
Owner:SHAANXI NORMAL UNIV

Internet of things data transmission method

The invention provides an Internet of things data transmission method. The Internet of things data transmission method comprises the following steps: S1, sending request information to a data receiving terminal by a data sending terminal, and feeding back an encrypted character string by the data receiving terminal; S2, receiving the encrypted character string by the data sending terminal, and recording time node information T2 of the received encrypted character string; S3, receiving the time node information T2 of the received encrypted character string by the data sending terminal, and forming an encryption key from the time node information T2 and the encrypted character string according to a predetermined rule; S4, encrypting message information through the encryption key by the data sending terminal, and sending the encrypted message information and the time node information T1 to the data receiving terminal according to predetermined delay time T3; S5, judging whether the received encrypted message information is legal by the data receiving terminal, if so, decrypting data, and otherwise, discarding the received information. By the Internet of things data transmission method, message data in an Internet of things platform can be effectively encrypted so as to ensure data security in an Internet of things system.
Owner:重庆和贯科技有限公司

Method of hybrid searchable encryption and system using the same

The present invention involves with a method of hybrid searchable encryption, involving using at least one first computing device that has a first processor configured to perform steps of: using a first symmetric key to encrypt data so as to obtain a data first ciphertext, using a second symmetric key to encrypt a keyword related to the data so as to obtain a searchable keyword first ciphertext that is related to the data first ciphertext, and saving the data first ciphertext and the keyword first ciphertext in a first memory of a first computing device; and using the first symmetric key to encrypt the keyword so as to generate a keyword second ciphertext, using a first public key to encrypt the keyword so as to obtain a searchable third keyword ciphertext related to the keyword second ciphertext, and sending the keyword second ciphertext and the searchable third keyword ciphertext to a second computing device; wherein the second computing device has a second processor that is configured to perform steps of: receiving the keyword second ciphertext and the searchable third keyword ciphertext from the first computing device and saving the two together with an identification of the first computing device relationally in a second memory of the second computing device.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products