Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

116results about How to "Enable secure communication" patented technology

Device for establishing network isolated channel and method thereof

The invention relates to a device for establishing a network isolated channel and a method thereof. A safe communication channel is established between two or multiple network devices through a network channel isolating device. The network channel isolating device is provided with an internal network interface and an external network interface. The internal network interface is connected with an internal network device. The external network interface is connected with an external network device. The network device which is connected with the internal network interface is protected by the network channel isolating device. A set of network devices protected by the network channel isolating device is called as a network channel isolating device protection domain. Host computers in different domains can communicate safely. By establishing a virtual network isolated channel through a public network among different geographic locations and by adopting an encryption algorithm recommended by the State Secrecy Bureau to conduct high-strength encryption to communication data, any third party cannot effectively decrypt the encrypted data and the communication data cannot be falsified; and the problem that different departments of small and medium enterprises cannot communicate safely through the public network is solved.
Owner:周伯生

Physical layer safe communication method designed by combining signal feedback and artificial noise in wireless communication network

The invention discloses a physical layer safe communication method designed by combining signal feedback and artificial noise in a wireless communication network. The method comprises a first stage that a sending end sends information needing to be kept secret to a legal receiving end; a second stage that after the legal receiving end receives the information, a certain amount of artificial noise is mixed in the received information, and the mixed signal is fed back to the sending end; and a third stage that the sending end sends feedback signal to the receiving end. The legal receiving end knows the artificial noise mixed in the second stage, so that the legal receiving end can eliminate the artificial noise; an eavesdropping end cannot eliminate the noise, so that the performance is weakened by the artificial noise; and the safe communication between the sending end and the receiving end is realized. According to the scheme, the safe communication between the legal devices can be realized under the condition that the legal communication devices have no antenna, no external helper and no any channel information of the eavesdropping end. The method has superiority in the communication safety aspect.
Owner:XI AN JIAOTONG UNIV

Encrypting and authenticating equipment with dual safety chips

The invention discloses an encrypting and authenticating equipment with dual safety chips, belonging to the technical field of identity authentication. The equipment comprises a shell, a USB plug outside the shell, a first safety chip, a second safety chip and a radio-frequency antenna, wherein the first safety chip, the second safety chip and the radio-frequency antenna are encapsulated in the shell; the first safety chip is connected with the USB plug, is connected with the second safety chip in the shell, and is also connected with an external system host computer by the USB plug; the second safety chip is connected with the radio-frequency antenna and is connected with a radio-frequency receiving terminal by the radio-frequency antenna; and the first safety chip and the second safety chip carry out communication with each other by an I/O interface. In the invention, two safety chips are used, the two safety chips are internally embedded in an intelligent card embedding software system respectively, thus realizing one corresponding application respectively; and the mutual independence of the two safety chips is effectively ensured, the safe and convenient multi-application formsare realized, furthermore, the two safety chips can realize the safe communication by the I/O interface.
Owner:BEIJING HUADA ZHIBAO ELECTRONICS SYST

Secure communication method and secure communication system of self-service device, and self-service device

The invention discloses a secure communication method and a secure communication system of a self-service device, and the self-service device, wherein the method comprises the following steps: a step1, a security module and a trusted end perform interactive identity authentication through issuing certificates and verifying signatures, and after passing identify authentication, the security moduleobtains an encryption secret key and a MAC secret key from the trusted end; a step 2, when the security module receives a service instruction, the security module identifies whether the service instruction is a preset critical service instruction, if so, the security module extracts sensitive data in the service instruction, and performs encryption treatment and security verification through theencryption secret key and the MAC secret key; a step 3, if the security verification in the step 2 is passed, the security module sends the service instruction to a matched critical service module. According to the invention, by the method, security services are provided for the critical service module on the self-service device, and security level of the self-service device is improved.
Owner:CHINA ELECTRONICS GREAT WALL CHANGSHA INFORMATION TECH

Intelligent home central control system and method based on user manipulation grade

The invention provides an intelligent home central control method based on user manipulation grade. The method comprises the steps that S0, a control privilege list of each formal family member and temporary visitor over each intelligent home device is configured, and the control privilege list is stored in a central controller of the intelligent home; privilege deadline information of a user terminal corresponding to the each formal family member and temporary visitor is configured in the central controller; S1, the central controller receives connection requirement information sent by the user terminal, and determines the type of the connection requirement information; S2, a connection record of the user terminal in the central controller is judged; S3, a mobile phone number of the user terminal is obtained, and whether the user terminal number exists in the list of formal family members or temporary visitors in the central controller or not is judged; S4, the central controller generates a random number, sends the random number after encryption to the user terminal, and the random number after being decoded by the user terminal is sent to the central controller after the random number is encrypted by an elliptic curve cryptography algorithm.
Owner:NINGBO HOPE INTELLIGENT TECH

OAM entanglement modulation key distribution network system and method with real-time tracking compensation

The invention provides an OAM entanglement modulation key distribution network system with real-time tracking compensation. The OAM entanglement modulation key distribution network system comprises anOAM-OAM entanglement generation unit, a first multiplexing module, a second multiplexing module, an OAM modulation unit, a Bob client and a coincidence measurement unit, wherein the OAM-OAM entanglement generation unit is used for generating an orbital angular momentum and an orbital angular momentum mixed entanglement quantum state; the first multiplexing module and the second multiplexing module are used for separating any OAM state; the OAM modulation unit is used for carrying out phase deflection modulation on the orbital angular momentum and loading coding information; and the coincidence measurement unit is used for performing coincidence measurement on signal light and idle light to decode the quantum bit information. According to the invention, the security of the quantum key distribution system is improved; an adaptive optical system is introduced, phase distortion caused by atmospheric turbulence is reduced, and the mode consistency during OAM light interference is guaranteed; an M-Z interferometer is used for separating any OAM, the quantum coding capacity is expanded, and an efficiently coded quantum key distribution system is obtained; and the engineering applicationrange is wide, the structure is simple, and the expandability is high.
Owner:GUANGDONG INCUBATOR TECH DEV CO LTD

Internet of Things equipment safety communication system and method, networking equipment and server

The invention provides an Internet of Things equipment safety communication system and method, networking equipment and a server, which are used for achieving safe communication between the networkingequipment and the server in Internet of Things; the networking equipment comprises a login request unit, a first secret key calculation unit and a first communication unit, wherein the server comprises a login authentication unit, a login feedback unit and a second communication unit, wherein the login request unit is used for sending login request information; the login authentication unit is used for carrying out authentication on the login request information; the login feedback unit is used for generating login feedback information and a session key and sending the login feedback information to the networking equipment; the first secret key calculation unit is used for generating the session key; and the first communication unit and the second communication unit communicate through the session key. According to the Internet of Things equipment safety communication system and method, the networking equipment and the server, the session key is generated in a login authentication process, and safe communication of the Internet of Things equipment can be realized only by occupying a small amount of resources.
Owner:SHENZHEN INOVANCE TECH

Rapid authentication method and system for trusted execution environment

The invention provides a rapid authentication method and system for a trusted execution environment, which are reasonable in design, fast in enclave authentication speed, small in calculation overhead and capable of rapidly establishing a trusted communication channel. The method comprises the following steps: when a trusted execution environment is initialized, an agent enclave receives an authentication request of a service provider, and pre-generates and obtains an own authentication report; the subordinate enclaves managed by the agent enclave sequentially initiate authentication requests, verification authentication is carried out according to a preset authentication program, if all the subordinate enclaves pass authentication, a safe communication channel between the agent enclave and the subordinate enclaves managed by the agent enclave is established, and otherwise, initialization is stopped; after initialization is completed, a user service request is received, and a pre-generated proxy enclave authentication report corresponding to the service request is sent to the user; and after interactive authentication with the user, the communication content is encrypted, a trusted communication channel between the user and the agent enclave and the slave enclave managed by the agent enclave is established, and rapid authentication of the trusted execution environment is completed.
Owner:INST FOR INTERDISCIPLINARY INFORMATION CORE TECH XIAN CO LTD

M2M (Machine-to-Machine) terminal security access method and terminal and management platform

The invention relates to an M2M (Machine-to-Machine) terminal security access method. The method comprises the following steps that: the M2M terminal generates login request information including a first random number and encrypts the login request information by using a base password calculated according to security data pre-stored in a UIM (User Identifier Module); the M2M terminal calculates a ciphertext and the base password by using a digest algorithm so as to obtain a first digest; the M2M terminal transmits the ciphertext and the first digest to the M2M management platform; the M2M management platform adopts the digest algorithm to calculate and obtain a second digest; the first digest is compared with the second digest, if the first digest is the same as the second digest, the ciphertext is decrypted according to the base password, thereby obtaining the login request information and accomplishing the login; and the M2M terminal and the M2M management platform adopt the digest algorithm to calculate the security data and the first random number, respectively, thereby obtaining a session password and decrypting a subsequent session process by using the session password. The invention further relates to an M2M terminal and a management platform. According to the invention, a relatively perfect application security mechanism is provided for communication between the M2M terminal and the M2M management platform.
Owner:CHINA TELECOM CORP LTD

Second generation USB (Universal Serial Bus) key system for implementing safety pavement of mobile terminals

The invention relates to a second generation USB (Universal Serial Bus) key system for implementing the safety pavement of mobile terminals, which comprises a USB interface module, a master-slave control module, a safety control module, a battery management module, a display module and a key module. The USB interface module adopts a standard mini UBS3.0 interface; an interface A is a USB2.0 interface for being connected with iOS (Internetwork Operating System)-series and Android-series mobile equipment; an interface B is a USB3.0 interface for being connected with a PC (Personal Computer); the master-slave control module adopts a CH374 chip; the safety control module uses a 3272L chip as a master control chip; the display module uses an A514 chip as a display chip; according to an MFi (Made for iPod/iPhone/iPad) authentication module, an IPOD_AC_2.0C Apple authentication coprocessor is connected with the 3272L chip by an I2C (Inter-Integrated Circuit) interface so as to implement the authentication on the iOS-series equipment; and by the interfaces, the master-slave control module, an online second generation key is connected into the PC, the Android equipment, the iOS-series equipment and OTG (On-The-Go) equipment to implement safety communication among various mobile terminal equipment. The problem of the limitation that the existing second generation key can only be connected into the PC to carry out network payment is solved.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products