Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

33results about How to "Encryption guaranteed" patented technology

Selective satellite image compression encryption method based on Chacha20 and CCSDS

The invention provides a selective satellite image compression encryption method based on Chacha20 and CCSDS. Aiming the characteristics of a satellite image, the method comprises the steps: firstly carrying out the three-stage two-dimensional discrete wavelet transformation through employing a 9/7 integral wavelet in a CCSDS image compression algorithm, and obtaining a DC coefficient and an AC coefficient after transformation; secondly generating a ChaCha20 initial byte stream through the head information in a coding item and a 512-bit initial secret key and ChaCha20 Hash; thirdly carrying out the summation and modular operation of a chaos initial secret key and a plaintext image normalization value through the byte stream generated by PWLCM (Piecewise Linear Chaotic Map) and the ChaCha20 initial byte stream, and generating a ChaCha20 byte stream; fourthly carrying out the XOR encryption of the ChaCha20 byte stream and the DC coefficient and AC coefficient (the father and son coefficients in each block) and all AC coefficient symbol bites; finally enabling the encrypted DC and AC coefficients to be coded and compressed, and completing the compression and encryption of the satellite image. The generation of the ChaCha20 byte stream is related with the to-be-encrypted satellite image and a compression coding parameter, thereby improving the encryption adaptability.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Digital image encryption method, decryption method and system based on chaotic system

PendingCN114157408ALarge dynamic propertiesStrong dynamic propertiesSecuring communication by chaotic signalsChaotic systemsDigital image
The invention discloses a digital image encryption method, decryption method and system based on a chaotic system, and belongs to the field of chaotic image encryption, and the encryption method comprises the steps: taking a one-dimensional chaotic mapping as a seed mapping, introducing a multiplication operator and a modular operator, constructing a strong dynamic chaotic mapping, initializing a control parameter of strong dynamic chaotic mapping by using the hash value of the digital image to be encrypted and the encryption key; iterating the strong dynamic chaotic mapping for multiple times, extracting bits with a preset length from a chaotic state value obtained by each iteration to form a corresponding pseudo-random sequence, and diffusing image pixels of the digital image to be encrypted by using the pseudo-random sequence; and performing multiple iterations on the strong dynamic chaotic mapping again, converting a chaotic state value obtained by each iteration into an integer value in a set interval until a set number of different integer values are obtained, and performing scrambling operation on image pixels after diffusion processing to obtain a final encrypted image. And the digital image is encrypted safely and effectively.
Owner:HUAZHONG UNIV OF SCI & TECH

Bluetooth communication system and method

The embodiment of the invention discloses a Bluetooth communication system, and the system comprises at least two Bluetooth communication devices, and at least two Bluetooth communication devices are arranged according to a preset sorting rule. Each Bluetooth communication device is used for forming a new information acquisition message after adding the device information corresponding to the Bluetooth communication device to the received information acquisition message, and transmitting the information acquisition message to a target device as a source device; wherein the received information acquisition message is sent by a sending end gateway or is sent by the Bluetooth communication device serving as the source device corresponding to the information acquisition message; the target device is a receiving end gateway or a Bluetooth communication device satisfying a set transmission strategy. According to the Bluetooth communication system provided by the embodiment of the invention, a transmission path can be ensured not to be interrupted when a link link is lost in a transmission process, and a network storm cannot be generated in a local area network due to the fact that a plurality of Bluetooth communication modules report messages at the same time.
Owner:SHANGHAI SIIC LONGCHUANG SMARTER ENERGY TECH CO LTD

High-security computer encryption auxiliary device with data protection function

The invention relates to the technical field of computer equipment, in particular to a high-security computer encryption auxiliary device with a data protection function. The auxiliary device comprises an equipment main body, positioning slide rails are fixedly connected to the left side wall and the right side wall in the equipment main body, and reset frames are fixedly connected to the lower surfaces of the positioning slide rails; a movable plate is fixedly connected to the right side face of the reset frame, an extrusion plate is fixedly connected to the lower surface of the movable plate, an electromagnet is fixedly connected to the position, located below the movable plate, of the bottom face in the equipment main body, and insect expelling powder in an air cushion is extruded and discharged, so that insects in a machine room are prevented from entering the equipment, thus the data lines and internal parts will not be damaged, the working failure of encryption software is avoided, the equipment is well protected, the limiting clamping plates and the clamping plates interact to limit the middle data lines, the data lines are prevented from being separated and loosened, and the working efficiency of the equipment is ensured.
Owner:HANGZHOU ZHOUJIN TECH CO LTD

Gateway system based on safe communication

The invention belongs to the field of communication, and discloses a gateway system based on safe communication, which comprises a plurality of gateways and a server, at least one first gateway is provided with a short message communication interface, the plurality of gateways are in safe communication with the server, the first gateway requests a secret key from the server through a short message, the server sends the secret key to the first gateway, and the server sends the secret key to the first gateway. The first gateway splits a secret key into a plurality of sub-secret keys according to a Shamir secret sharing threshold method and sends the sub-secret keys to other gateways, after data to be sent by other gateways are partitioned, the sub-secret keys are randomly used as symmetric secret keys to encrypt the partitioned data and send the partitioned data to the server, and the server decrypts the received data by using the sub-secret keys. The encrypted secret key is sent through the short message, it is effectively guaranteed that the secret key is not leaked, the secret key is further decomposed into the sub-secret keys, the sub-secret keys are used for encrypting data, and the encryption effect is guaranteed.
Owner:上海赋华网络科技有限公司

Anti-collision interruptible recovery voice secret transmission method, device and system

The invention relates to the technical field of communication security, and discloses an anti-collision interruptible recovery voice secret transmission method, device and system, and the method comprises the steps: carrying out grading of a user terminal, employing an identity secret key to read an identifier, obtaining a transmission secret key through the identifier, carrying out transmission of a session secret key through the transmission secret key, and establishing an encrypted session through the session key. The device comprises a user terminal, a server and a background database, thesystem comprises one or more processors, a storage device and an anti-collision interruptible recovery voice secret transmission device. Conflict processing of multiple voice communication requests can be achieved, voice communication can be conveniently and reliably kept secret, and meanwhile, when the session is accidentally interrupted, effective unification of confidentiality recovery, data two-party identification and data confidential transmission can be realized, so that the confidential data is prevented from being maliciously eavesdropped or counterfeited, and the method has a relatively good practical value.
Owner:合肥诺卡物联网科技有限公司

An intelligent system for laboratory management of PCR inspection records

The invention relates to the technical field of laboratory management, in particular to an intelligent system for laboratory management of PCR inspection records. The system includes a central processing unit, the central processing unit is arranged in a laboratory management center; the central processing unit is electrically connected with a laboratory terminal; the laboratory terminal is electrically connected with a PCR experiment module; wherein the central processing unit is electrically connected with a data extraction module, the data extraction module is electrically connected with anaudit passing module, the audit passing module is electrically connected with an authority authentication module, the authority authentication module is electrically connected with a user query module, the laboratory terminal is electrically connected with a time recording module, and the time recording module is electrically connected with the data extraction module. The intelligent system for laboratory management of PCR inspection records is convenient to use and operate, orderly proceeding of experiments and real-time display of experiment data can be guaranteed due to the existence of the PCR experiment module, and meanwhile, the system can guarantee the encryption of the experiment data and orderly classified storage of the data.
Owner:GUANGDONG SOURCE OF WISDOM INFORMATION TECH CO LTD

A hydrogen energy vehicle vehicle network system

ActiveCN112422392BRealize functionReliable and secure network architectureNetwork connectionsBus networksIn vehicleNetworked system
The invention provides a whole vehicle network system for hydrogen energy vehicles, including a gateway controller, a vehicle brake module, a vehicle management module and an on-board automatic diagnosis system, wherein the gateway controller includes a first CAN network, a second CAN network, a third CAN network, and a third CAN network. The CAN network, the fourth CAN network, the first gateway encryption module and the second gateway encryption module, the input end of the first gateway encryption module is electrically connected to the first CAN network, and the output end of the first gateway encryption module is connected to the first gateway encryption module. The three CAN networks are electrically connected, the input terminal of the second gateway encryption module is electrically connected to the second CAN network, the output terminal of the second gateway encryption module is electrically connected to the fourth CAN network, and the vehicle brake module is electrically connected to the third CAN network. A CAN network is electrically connected, the vehicle management module is electrically connected to the second CAN network, the vehicle-mounted automatic diagnosis system includes a sixth CAN network and a seventh CAN network, the sixth CAN network is electrically connected to the third CAN network, The seventh CAN network is electrically connected to the fourth CAN network.
Owner:WUHAN GROVE HYDROGEN AUTOMOBILE CO LTD

Data encryption system for block chain

InactiveCN112380558AEncryption guaranteedRealize two-way protection functionDigital data protectionComputer hardwareCiphertext
The invention discloses a data encryption system for a block chain, and the system is characterized in that the output end of a first plaintext unit is electrically connected with the input end of anAES encryption unit, the output end of a first AES key unit is electrically connected with the input end of the AES encryption unit, the output end of the AES encryption unit is electrically connectedwith the input end of a first ciphertext unit, the output end of the RSA encryption unit is electrically connected with the input end of the first ciphertext unit, the output end of the first plaintext unit is electrically connected with the input end of the first DS5 abstract unit, and the output end of the first DS5 abstract unit is electrically connected with the input end of the RSA encryption abstract unit. The invention relates to the technical field of data encryption. According to the data encryption system for the block chain, the problem that when traditional data is uploaded, single encryption protection is conducted on the data, but in the method, when the identity of a data sending party or a data receiving party is pretended or forged by others to destroy encryption of the data, the data can be tampered or deleted or lost in the transmission process is solved.
Owner:东莞市莞云信息科技有限公司

Blockchain uploading method for preventing data tampering

The invention discloses a data tampering prevention blockchain uplink method, and the method comprises the following steps that S1, an uplink hardware system and a blockchain node carry out identity mutual verification, and initialized identity authentication is completed; S2, the uplink hardware system obtains the key data from the service equipment through the data acquisition hardware interface, and performs identity signature and encryption on the key data; S3, the uplink hardware system obtains the associated data from the communication device through the near field communication module, and performs identity signature and encryption on the associated data; S4, the uplink hardware system packages the key data and the associated data, performs identity signature and encryption on the packaged data, and sends the packaged data to the block chain node to complete data uplink. According to the method disclosed by the invention, the key data is ensured to pass through the verification and protection mechanism of the uplink hardware system before being uplink, and is directly uplink on the block chain node, so that the risk that the data is maliciously modified before being uplink through other service platforms is avoided, and the integrity and encryption of the uplink data are ensured.
Owner:厦门致联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products