Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

339results about How to "Ensure communication security" patented technology

Safety communication secret key negotiation interaction scheme

The invention provides a method for safety communication between an application on a mobile terminal and a network server. Shared secrets of a user and a server are overlapped and bound with an identification code of mobile intelligent terminal equipment and a mobile phone number of the user by utilizing a cryptology; then the obtained product is applied to an identity authentication system to implement authentication on a client side; a digital certificate and a digital signature mechanism are utilized to implement authentication on the server; a session key is established with a network server by utilizing a Differ-Hellman secret key negotiation protocol so as to carry out safety data communication. The method is characterized in that the shared secrets are overlapped and bound with identification code of the machine and the mobile phone number of the user and the shared secrets are updated regularly; even though information is stolen by an attacker, a system still cannot be influenced. The user not only needs to provide a login password, but also needs to use the system on designated equipment. The method can ensure that the user carries out safety communication with the server on internet by the mobile equipment.
Owner:QINGDAO WEIZHIHUI INFORMATION

Chip, data communication method for chip, consumable container and imaging equipment

The invention provides a chip of a consumable container, which comprises a storage module, a control module, an interface module and a data safety module. The storage module is used for storing initial data, printing data, control data and key data; the interface module is used for realizing data communication between the storage module and the control module; the data safety module is respectively connected with the interface module and the control module, and is used for identifying a type and a content of data communicated between a printer and the chip, encrypting matched data in a selected safe mode and decrypting the data; the control module is connected with the storage module and is used for controlling data communication between the chip and the printer and the access operation of the data of the storage module and external data and sending a corresponding control command to the chip according to a safety module processing result so as to realize data communication; and the same keys are stored in the printer and the chip. The invention also provides a data communication method for the chip, the consumable container with the chip structure, and imaging equipment with the consumable container. The safety of the communication data of the chip can be protected.
Owner:ZHUHAI TIANWEI TECH DEV CO LTD

Method and device for secure communication in Internet of Things

The invention provides a method and a device for secure communication in Internet of Things. For communication between devices of any two parties, namely a first device and a second device, in the Internet of Things with interconnected devices of three parties, namely a cloud platform, an intelligent device and a mobile terminal, the first device executes the following steps of carrying out identity validity judgement with the second device through a method for verifying a digital signature of a digital certificate; and communicating with the second device when the first device and the second device both successfully pass through the identity validity judgement. Through adopting the method for verifying the digital certificate to carry out identity authentication on various interconnected intelligent devices in the Internet of Things, and the security control of bidirectional authentication is realized in a process for communication between the intelligent devices, so that the security risks that the devices are counterfeit and the opposite terminal is forged are effectively prevented and the communication security of the intelligent device is guaranteed. After identity authentication, the encrypted communication is carried out, so that the hacking risk is effectively prevented and the communication security is more completely guaranteed.
Owner:QINGDAO HAIER INTELLIGENT HOME TECH CO LTD

Multilink safety communication method based on completion port model

The invention provides a method for supporting multilink concurrence safety communication between a server and multiple clients and relates to a multilink safety communication method based on a completion port model. The method includes that a main worker thread at a communication server is embedded into an application service of a Windows system to run, a transmission control protocol (TCP) communication server is built according to the completion port model, meanwhile a fixed number of communication interface threads are built to conduct communication with the clients in an asynchronous mode, and the parallel processing capability of the server is improved. In an interaction process, after any client builds the TCP connection, two communication parties must adopt a handshake mechanism to ensure connection legality and adopt connection pool queues or local variables to dynamically maintain message serial numbers in the following data receiving and transmitting process, data transmitted by any party on the legal connection are packaged again according to the data package structure definition, and the receiving party adopts a safety verification algorithm to verify the data packages and regroup the plurality of data packages according to the precedence order of the message serial numbers.
Owner:中船凌久高科(武汉)有限公司

Session cipher key distributing method and system

The invention relates to a session key distribution method which comprises the steps as follows: a first key request message sent by a calling party communication terminal is received, and the first key request message includes a first temporary public key; a communication session key is generated according to the first key request message, and a cryptographic notification message is sent to a called party communication terminal; a second key request message sent by the called party communication terminal is received, and the second key request message includes a second temporary public key; the communication session key is encrypted by respectively using the first temporary public key and the second temporary public key, and a first key response message is sent back to the calling party communication terminal, and a second key response message is sent back to the called party communication terminal. The invention relates to a session key distribution system. The invention realizes the distribution of the keys of the two communication parties having encryption requirements at the network side, utilizes the asymmetric key way to protect the session key, and ensures the safety of the session key transmission; and the session key is distributed by the network side to cause the communication terminals to be free of complex key management.
Owner:CHINA TELECOM CORP LTD

Secrete communication system and method for smart phone

The invention belongs to the technical field of information safety, in particular to secrete communication of a smart phone. According to the technical scheme, a secrete communication system for the smart phone comprises a communication management platform (1), a main control service system (3) and a plurality of secrete mobile phones (3). Compared with the technology and method for the other secrete mobile phones, the secrete communication system and method use an encryption crushing technology and a recombination decryption technology to transmit complete communication information through x mobile communication signal channels, and each mobile communication signal path transmits one part of cipher-text fragments of a voice data unit or a short message; people cannot restore the complete cipher-text not to mention the plain text of the voice or the plain text of the short message through eavesdropping any one of the mobile communication signal channels, and therefore, the illegal eavesdropping on the mobile communication network is effectively avoided; the voice data or short message encryption, decryption and crushing recombination are performed in a customized SD key in the secrete mobile phone, and the rogue program eavesdropping to the secrete mobile phone terminal can be effectively avoided.
Owner:BEIJING CHERILEAD TECH

A Method of Ensuring the Security of Client Software

The invention discloses a method for ensuring the security of client software. The method comprises the following steps of: 1, downloading the software by using a terminal, and adding terminal identity authentication information into a software packet by using a server; 2, transmitting a binding request to the server by using the terminal; 3, verifying the legality of the binding request, and if the binding request is legal, transmitting a binding success information to the terminal; 4, verifying the legality of the binding success information; 5, transmitting a login request to the server by using the terminal; 6, verifying the legality of the login request, and if the login request is legal, transmitting a login success information to the terminal; and 7, verifying the legality of the login success information, and if the login success information is legal, keeping a session. By the method, the software can be better prevented from being falsified; the security of communication between the terminal and the server can be ensured; replay attacks can be effectively prevented; the software can be detected whether to be falsified or not; and even though a hacker downloads the software and attacks the server by falsifying the software, only the terminal cannot be used normally and the normal use of other users may not be influenced.
Owner:北京无限新锐网络科技有限公司

Internet of Things safety management system

The invention relates to an Internet of Things security management system. A private key center and an application server perform communication authentication data transmission through a soft shield;the application server side performs mutual communication of key distribution, identity authentication and data encryption with the client control terminal and the Internet of Things terminal at the same time; mutual communication of identity authentication and data encryption is carried out between the client control terminal and the Internet of Things terminal, wherein the private key center comprises a KPC key production assembly, a KMC key management assembly and a key authentication assembly, the application server comprises a security edge computing SDK module and a server application module, and the client control terminal comprises an encryption and decryption security module and a client application module, and the Internet of Things terminal comprises an Internet of Things communication module, a security algorithm module and an SE chip. According to the Internet of Things security management system, only the user is completely autonomous and controllable in the Internet of Things system, the cloud system does not have the authority of directly operating the user equipment, and the Internet of Things control security level can be effectively improved.
Owner:深圳前海智安信息科技有限公司

Internet of things home appliance management system and management method

The invention discloses an Internet of things home appliance management system and an Internet of things home appliance management method. The system comprises an Internet of things home appliance management platform, a plurality of home modular terminals and various home appliances in which decoding singlechip controllers are arranged. The management method comprises the following steps that: the Internet of things home appliance management platform starts the Internet of things home modular terminals by short messages or in an Internet communication mode, so that two-way communication of home appliance control information between the terminals and the management platform is realized; electric wires which pass through the interior of a home are connected with power line carrier communication interfaces included in the various Internet of things home appliances, so that communication with the decoding singlechip controllers arranged in the networked home appliances is realized; and the decoding singlechip controllers in the home appliances carry out instruction identity identification and matching and translate control instructions sent to the controllers into same address codes of each control key in a monitoring program corresponding to a keyboard controlled by the home appliances, so that direct connection with conventional control functions of each home appliance is realized. A simple, easy and low-cost method is provided for managing requirements of the Internet of things home appliances of different manufacturers.
Owner:安徽省皖江质量检测科技有限公司

Method for mobile terminal to possess communication function of locking and unlocking, and mobile terminal thereof

The invention provides a method for a mobile terminal to possess communication functions of locking and unlocking, and the mobile terminal thereof. The method comprises the following steps: through monitoring operation conditions of a mobile terminal user interface, when a communication unlocking state of the mobile terminal is converted into a locking state, closing a function of communication between the mobile terminal and mobile network, wherein the communication is initiated by the mobile terminal; when the communication locking state of the mobile terminal is converted into the unlocking state, automatically opening the function of communication between the mobile terminal and the mobile network, wherein the communication is initiated by the mobile terminal. The function of active external communication can be locked when the mobile terminal is in the locking state. When the mobile terminal is in the unlocking state, the function of active external communication can be automatically recovered. Communication safety of the mobile terminal can be guaranteed. Information leakage and communication cost losses can be avoided, wherein the information leakage and the communication cost losses are caused by initiating external communication which is controlled by malicious programs or viruses when the mobile terminal is in a standby state which means the locking state.
Owner:王冬梅

Inter-application communication method, client side and application process manager of online application platform

The invention provides an inter-application communication method of an online application platform. The inter-application communication method comprises the following steps: a client side of the online application platform starts an application and creates an application process according to a predetermined communication protocol; the processable message type of the application is recorded; when inter-application communication is carried out, a message from a sender application is received and delivered into a message queue of one application process corresponding to a receiver application; the application process corresponding to the receiver application monitors and processes the message in the message queue; and when the sender application or the receiver application quits, the application process is destroyed. The invention also provides a client side of the online application platform and an application process manager of the online application platform, wherein the client side comprises multiple applications and an application process manager; and the application process manager of the online application platform comprises a process creating interface, a process message sending interface and a process destroying interface. The introduced user participation and authorization procedures due to a safety factor in information transmission are avoided fundamentally.
Owner:厦门格畅科技有限公司

Method and device for security authentication

Embodiments of the invention disclose a method and device for security authentication. The method comprises the following steps: performing password authentication with a server based on a transmittedpassword authentication message to obtain a password authentication result; sending an authentication request message to the server when determining that the password authentication result characterizes password authentication success; and performing security authentication by the way of digitally signing all interaction messages through the server, and performing digital signature verification through the client, or by way of performing public key encryption by the client on the local random numbers and all the interaction messages, and verifying the random numbers returned by the server. Thus, the identity correctness of both communication parties is ensured by the way of combining the password authentication with digital signature, or combining the password authentication with public key encryption, thereby avoiding network attacks such as message leakage and malicious information tampering during the communication, improving the reliability of network authentication, and guaranteeing the user's communication security.
Owner:CHINA MOBILE COMM LTD RES INST +1

Vehicle node certificate updating method based on Vehicle to X (V2X) network

The invention discloses a vehicle node certificate updating method based on a Vehicle to X (V2X) network. A vehicle node applies for an updated certificate from a PKI (Public Key Infrastructure) system via a roadside node; the PKI system sends part of private keys to the vehicle node; the vehicle node generates a new public key and a new private key using the part of private keys and part of private keys generated per se, generates a certificate using the new private key, and sends the certificate to the PKI system; the PKI system verifies the validity and the accuracy of the certificate; and after the certificate passes the verification, the PKI system updates the certificate of the vehicle node using the public key generated by the vehicle node, and issues the updated certificate to the whole network. The updated certificate, the new public key and the new private key are all generated using part of private keys of the PKI system and part of private keys of the vehicle node, and only the vehicle node has node private keys, so the information issued by the vehicle node can be effectively prevented from being decrypted by the PKI system, and the security and the non-repudiation of communication of the vehicle node in the V2X network are guaranteed.
Owner:DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products