Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

34results about How to "Encryption is valid" patented technology

Image encryption method based on Feistel network and dynamic DNA encoding

The invention provides an image encryption method based on a Feistel network and dynamic DNA encoding. The method comprises the following steps: computing a Hash value of an original plaintext image by using a Keccak algorithm, and taking the Hash value as an initial value of a hyper-chaotic Chen system, generating a Hill encryption matrix by using a chaotic sequence generated by the hyper-chaoticChen system so as to replace pixels of an original image; realizing image pixel value diffusion by using the DNA encoding operation as a F function of the Feistel network, and a DNA sequence base asa key of the Feistel network; and performing further diffusion through ciphertext feedback. Through three turns of chaotic scrambling-DNA encoding-Feistel conversion-DNA decoding, the ciphertext randomness and attack resistance are stronger, the scrambling conversion of the image pixel location and the diffusion of the pixel value are realized, and the encryption turn is reduced due to repeated scrambling and DNA encoding and decoding. Through the image encryption method provided by the invention, the image can be effectively encrypted, the plaintext sensitivity is strong, the plaintext attack, the differential attack and the statistical attack can be effectively resisted
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Internet of ships intelligent shore-based interaction device based on Beidou

The invention discloses an Internet of ships intelligent shore-based interaction device based on Beidou, and the device comprises an embedded-type main control board, an extended control board, a communication/positioning module, an AIS module, a ZigBee module, a sensor module, an RFID module, an internal control module, an encryption module, a power module, an external control module, a fingerprint recognition module, a DVR module, a multimedia module, a storage unit, an intelligent terminal system, a liquid crystal touch screen, and an interface module. The embedded-type main control board is connected with the extended control board. The power module is connected with the main control board and the extended control board. The communication/positioning module achieves interaction with shore-based equipment through a Beidou message or a 3G/GPRS signal. The device employs the technology of multimode positioning, the technology of sensing, the technology of wireless networking communication and the technology of safety encryption, achieves a function of inland river gate report, a function of visualized emergency command scheduling and a function of shipping electronic business, and prompts the building and development of inland river Internet of ships.
Owner:林兴志

Quantum key charging method of communication terminal

The invention relates to communication encryption, in particular to a quantum key charging method of a communication terminal. The method comprises the steps that connection relationships among a charging terminal, a quantum random number generator, an exchange cipher machine and a cipher service platform are established; the cipher service platform initializes a security medium in a communication terminal through the exchange cipher machine and the charging terminal; the quantum random number generator generates a charging key, and the exchange cipher machine generates an encryption key to encrypt the charging key; the charging terminal obtains the charging key based on a key obtaining token, and the exchange cipher machine encrypts the encryption key through a card public key and returns a charging key ciphertext and an encryption key ciphertext to the charging terminal; and the charging terminal imports the charging key ciphertext and the encryption key ciphertext into the security medium, the security medium returns a charging result to the charging terminal, and the charging terminal finishes key charging of the security medium. According to the technical scheme provided by the invention, the defects that an application range is limited and a quantum key is likely to be stolen in a quantum key charging process can be effectively overcome.
Owner:安徽国盾量子云数据技术有限公司

An optical dft-s-ofdm secure transmission system based on digital chaos

The invention discloses a light DFT-S-OFDM secure transmission system based on a digital chaos. The system comprises three encryption steps all together, i.e., insertion of an OFDM synchronous training sequence, DFT matrix signal preprocessing and subcarrier mapping, wherein an OFDM synchronous training sequence and a subcarrier mapping mode are both generated by a chaotic system, DFT matrix element parameters m and n are generated by the chaotic system, by use of initial value sensitivity and pseudo randomness of the digital chaos, encryption processing is performed on DFT-S-OFDM signals, and thus secret transmission is realized. On one hand, since a security system secret key space is huge, the security of high-speed information transmission can be effectively enhanced, and at the same time, since a DFT matrix can substantially reduce a peak average power ratio (PAPR) of OFDM signals, the performance of the transmission system is also improved; and on the other hand, since multiple iteration optimization and multiple discrete Fourier transformation operation are unnecessary in a DFT matrix signal processing system, the whole system has the following advantages: the system architecture is simple, the calculation amount is small, the transceiver cost is low, and transmission of sideband information is unnecessary.
Owner:SHANGHAI JIAOTONG UNIV

Digital image encryption method, decryption method and system based on chaotic system

PendingCN114157408ALarge dynamic propertiesStrong dynamic propertiesSecuring communication by chaotic signalsChaotic systemsDigital image
The invention discloses a digital image encryption method, decryption method and system based on a chaotic system, and belongs to the field of chaotic image encryption, and the encryption method comprises the steps: taking a one-dimensional chaotic mapping as a seed mapping, introducing a multiplication operator and a modular operator, constructing a strong dynamic chaotic mapping, initializing a control parameter of strong dynamic chaotic mapping by using the hash value of the digital image to be encrypted and the encryption key; iterating the strong dynamic chaotic mapping for multiple times, extracting bits with a preset length from a chaotic state value obtained by each iteration to form a corresponding pseudo-random sequence, and diffusing image pixels of the digital image to be encrypted by using the pseudo-random sequence; and performing multiple iterations on the strong dynamic chaotic mapping again, converting a chaotic state value obtained by each iteration into an integer value in a set interval until a set number of different integer values are obtained, and performing scrambling operation on image pixels after diffusion processing to obtain a final encrypted image. And the digital image is encrypted safely and effectively.
Owner:HUAZHONG UNIV OF SCI & TECH

An Image Encryption Method Based on Feistel Network and Dynamic DNA Coding

The invention provides an image encryption method based on a Feistel network and dynamic DNA encoding. The method comprises the following steps: computing a Hash value of an original plaintext image by using a Keccak algorithm, and taking the Hash value as an initial value of a hyper-chaotic Chen system, generating a Hill encryption matrix by using a chaotic sequence generated by the hyper-chaoticChen system so as to replace pixels of an original image; realizing image pixel value diffusion by using the DNA encoding operation as a F function of the Feistel network, and a DNA sequence base asa key of the Feistel network; and performing further diffusion through ciphertext feedback. Through three turns of chaotic scrambling-DNA encoding-Feistel conversion-DNA decoding, the ciphertext randomness and attack resistance are stronger, the scrambling conversion of the image pixel location and the diffusion of the pixel value are realized, and the encryption turn is reduced due to repeated scrambling and DNA encoding and decoding. Through the image encryption method provided by the invention, the image can be effectively encrypted, the plaintext sensitivity is strong, the plaintext attack, the differential attack and the statistical attack can be effectively resisted
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

A video frame stream processing method and video server

ActiveCN106791923BOvercoming defects such as the effect of encryptionEncryption is validSelective content distributionVideo transmissionTerminal equipment
The invention provides a processing method of a video frame stream, a video server and a terminal device. The processing method comprises the following steps of collecting, by the video server, a static menu image of each video frame in the video frame stream which is requested by the terminal device; coding the position, in the video frame stream, of the static menu image; carrying out fuzzy processing on the static menu image, so as to obtain a fuzzy image and a difference image; according to an encryption algorithm and an encryption key which are previously negotiated with the terminal device, encrypting the obtained difference image, and generating an encrypted file; transmitting the video frame stream of which the image is processed and the generated encrypted file to the terminal device. According to the processing method, the video server and the terminal device, which are provided by the invention, the static menu image of the video frame is subjected to the fuzzy processing to obtain the fuzzy image and the difference image; the difference image is encrypted; other persons are prevented from directly checking or obtaining a clear image of a video frame image; the effective encryption on a video is realized; the transmission safety of the video is improved.
Owner:ZHONGGUANG REDIANYUN TECH CO LTD

Smart Shared Financial Platform and System Based on Hash Encryption Algorithm and Quantum Key

The invention provides an intelligent sharing financial platform and system based on a hash encryption algorithm and a quantum key, comprising: a middle station receives first financial data sent by a data sending terminal, and selects a corresponding financial data according to the type information of the first financial data The first hash encryption algorithm calculates the first financial data to obtain the first hash value; the middle station receives the quantum encryption public key sent by the quantum server, and encrypts the first financial data according to the quantum encryption public key to obtain For the second financial data, calculate the second financial data according to the second hash encryption algorithm to obtain a second hash value; the middle station combines the first hash value and the second hash value to obtain a first combined hash value value, the middle station calls the third hash encryption algorithm to calculate the first combined hash value to obtain the third hash value; the middle station calculates the third hash value according to the first hash value, the second hash value and the third hash value; A hash table is generated from the value, and the hash table and the second financial data are sent to the data receiving end.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER

Randomness analysis-based data encryption function detection method

The invention discloses a randomness analysis-based data encryption function detection method, which comprises the following steps of: (1) generating a detection sequence: dividing a data sequence to be detected into a plurality of data subsequences to be detected according to the set conditions; (2) executing randomness detection: aiming at each item in 16 items of 8 classes of a randomness testmethod, and respectively performing randomness detection on the plurality of data subsequences to be detected; and (3) analyzing detection results: in the process of executing all detection items, ifany data subsequence does not pass any item of the randomness detection, judging that the data sequence to be detected is a nonrandom sequence, namely the data to be detected is not encrypted, and ifthe data subsequences pass the detection of all detection items, judging that the data to be detected has been subjected to a certain degree of encryption processing. The randomness analysis-based data encryption function detection method has the advantages that the test method is novel, and test angles are comprehensive and cover a plurality of aspects of the data sequence randomness; and the statistic test principle is adopted for detection, so the operation is simple and convenient and that whether the data is encrypted in an information system can be effectively and accurately judged.
Owner:BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products