Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

85results about How to "Ensure secure communication" patented technology

Vehicle-inside one-time-one-password communication method based on ECU identity concealment

The invention discloses a vehicle-inside one-time-one-password communication method based on ECU identity concealment. The method comprises the following steps: 1) creating a system model; 2) prior to the one-time-one-ciphering by ECU, registering information in the gateway database; 3) using the operation behaviors to the vehicle by the intelligent ECU as the media to generate a coupling effect between vehicle mounted power supply systems so that the vehicle mounted power supply voltage change possess the Markov characteristics and that a true random number is generated to serve as the session key; 4) updating in a fixed time the session key between the ECUs in need of communication so as to prevent replay attacks; and 5) according to the obtained session key, using the attributes of the ECU in the database, creating one-time-one-ciphering data communications based on the ECU ciphered text attributes to ensure the secure communications of ECU inside the vehicle. According to the invention, through the utilization of the stochastic behavior of the power supply voltage inside the vehicle to generate a session key, it is possible to effectively avoid the problem with the tampering and the forgery of information. Through the combination of the vehicle speed unit with the steering wheel, the 500ms cycle dynamic state generates the vehicle speed and serves as the session key for the ECU in order to prevent relay attacks.
Owner:东台城东科技创业园管理有限公司

Non-standard POE power supply circuit and power supply method for network interfaces, and power supply equipment

The invention belongs to the technical field of power over Ethernet, and provides a non-standard POE power supply circuit and power supply method for network interfaces, and power supply equipment. the non-standard POE power supply circuit is connected to a POE power supply and a cable interface; the cable interface includes a network interface signal line and a network interface power line; the non-standard POE power supply circuit includes an exchange module, a power-on detection module, a control module, a power failure detection module and a power supply module; whether the cable interfaceis accessed by power receiving equipment can be detected through the power-on detection module when the power receiving equipment is not powered on; after the cable interface accesses the power receiving equipment, the control module can generate power enable signals, and the power supply module can output the power signals of the POE power supply according to the power enable signals; and the power-on detection module can be disconnected to the network interface signal line through the control module after the power receiving equipment in in normal communication with the cable interface. Thus, the problems of high power supply costs and low flexibility of traditional POE power supply circuits can be solved.
Owner:TP-LINK

Ciphering transmission method of hard disk ATA instruction

The invention is suitable for the computer field and provides a method for encrypted transmission of an ATA instruction of a hard disk. The method comprises the following steps: a special ATA instruction is encrypted; an encrypted encryption key is re-encrypted through TPM; produced cryptograph is stored in a protective subarea of the hard disk; the special ATA instruction is the ATA instruction for communication between a mainframe system and the protective subarea of the hard disk; when a communication request is emitted, BIOS sends the special ATA instruction to a hard disk management system of the hard disk; the BIOS transfers the TPM and carries out integrated verification on a common ATA instruction transferring the special ATA instruction and a communication instruction between the BIOS and the TPM through the TPM; if the instructions are integrated, the encrypted cryptograph of the encryption key is taken out from the protective subarea of the hard disk through the BIOS, and the TPM is transferred to decrypt the encrypted cryptograph to obtain the encryption key; and the TPM sends a digital signature certificate and the encryption key to a hard disk encryption system, the special ATA instruction is decrypted through the hard disk encryption system, and the protective subarea of the hard disk is opened to execute the communication request.
Owner:CHINA GREATWALL TECH GRP CO LTD

Method for acquring authentication cryptographic key context from object base station

The invention involves the mobile communication field, a method that the aiming base station gets the context information of the identified-right secret key, to solve the inconsistent problem in the relating sequence number of the aiming base station identified-right secret key context and the mobile terminal in the existing technology. The method including: the identified righter / the provider of the secret key create the context information of the identified-right secret key when the mobile terminal request cut, the context information includes the current sequence number of the identified-right secret key, the sequence number of the upward managing information authentication code and / or the current sequence number of the downward managing information authentication code; the identified righter / the provider of the secret key send the identified-right secret key and the relating sequence number to the aiming base station when the aiming base station that the mobile terminal ready to cut request the identified-right secret key. Thus maintained the continuity of the sequence number information, ensure the secure communication with the mobile terminal, and prevent effectively the possibly appearing replay attack, ensure the conversation security after restore.
Owner:HUAWEI TECH CO LTD

Industrial wireless network security communication implementation method based on cipher key

The invention provides a method used for realizing the safety communication of an industrial wireless network based on cryptographic-key. By using the combination management mode of concentration type and distribution type, a safety network management framework consists of a safety manager, a safety management agent and a safety management object commonly; the method comprises the steps as follows: 1) the safety manager and the safety management agent provide the safety cryptographic-key; 2) when equipment accesses to the network, the equipment and the safety manager authenticates each other; 3) during the communication process, the data messages are converged ,encrypted and then transmitted; the network management mechanism based on the safety cryptographic-key can effectively solve the problems of limited memory capability of the wireless equipment in the industrial wireless network, calculation complexity and the like, furthermore, the network management mechanism can solve the safety problems that the data information is prone to be stolen, falsified and inserted during the process of wireless network transmission and communication, and can utilize the network resource more reasonably, improve the network performance, effectively realize the authentication and authorization of the equipment access to the network, distribution and update of the cryptographic-key, support the communication processing on network safety, and ensure the normal running of the network.
Owner:魏旻

Data communication method, apparatus, device and system for power centralized meter reading system

The invention discloses a data communication method for an LORA power centralized meter reading system. When data communication between an electricity meter terminal and a target server is performed at a current moment, the data communication is performed through an initial session key, when a time interval between a generation moment of the initial session key and the current moment satisfies anupdate period, the initial session key can be updated with a predefined rule to obtain an updated session key, and then, the data communication between the electricity meter terminal and the target server is implemented by the updated session key. The session key of the data communication between the electricity meter terminal and the target server in the LORA power centralized meter reading system is updated by setting the update period, so that the situation that the session key between the electricity meter terminal and the target server is unchanged for a long time, and the secure communication between the electricity meter terminal and a network server or an application server is guaranteed. In addition, the invention further discloses a data communication apparatus, device and systemfor the LORA power centralized meter reading system, which has the same effects mentioned above.
Owner:CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY

Access authentication and key agreement protocol and method of special network for space-aeronautics-vehicle-ground tracks

The invention discloses an access authentication and key agreement protocol and a method of a special network for space-aeronautics-vehicle-ground tracks. An authentication system consists of a core network configuration authentication subsystem and a user access authentication subsystem, which completes authentication and key agreement between an airship and a security and operation guarantee center and authentication and key agreement between a user and the airship respectively. In view of the structure and communication characteristics of the special network for space-aeronautics-vehicle-ground tracks, a core network configuration subsystem is constructed. Authentication and key agreement between the airship and the security and operation guarantee center is completed with a public key password to get symmetric keys. Symmetric keys used between the user and the airship are mutually authenticated on the basis of an LTE protocol to get a session key. The problem on secure communication and key updating is solved. There is no need for an authentication center to participate in user access authentication and key agreement. The use of symmetric keys ensures light workload and high efficiency. The method is used in access authentication of airship, high-speed rail and trackside equipment users and key agreement, and ensures secure transmission of a wireless communication link from the user to the airship and to the security and operation guarantee center.
Owner:XIDIAN UNIV

Method for realizing physical layer security and power optimization of full-duplex communication system

The invention discloses a method for realizing physical layer security and power optimization of a full-duplex communication system. A model fully utilizes the characteristic of same frequency at the same time of the full-duplex communication system, and assistance from man-made noise and other interference nodes is unnecessary, so that the transmission efficiency of a full-duplex base station is further increased, and the transmission power of the base station is optimized under the condition that the full-duplex system information transmission is guaranteed to reach to a target secure rate. The method mainly comprises the steps of constructing a physical layer security model of the full-duplex communication system; constructing a convex optimization model based on a secure rate required by the system; and finally converting a non-convex problem which is difficult to solve into a convex optimization problem which is easy to solve by utilizing an SDP theory and an S-Procedure theory, thereby finding an optimal beam forming vector and optimizing the transmission power of the base station. According to the method for realizing physical layer security and power optimization of the full-duplex communication system, the minimum transmission power of the base station is guaranteed and all the transmission power of the base station is guaranteed to be used for transmission of effective signals under the condition of secure transmission of the full-duplex system, and the transmission power of the full-duplex base station is accordingly optimized.
Owner:XIAMEN UNIV

Efficient random physical layer secrete key generation method based on vector quantization

The invention discloses an efficient random physical layer secrete key generation method based on vector quantization. According to the method, a first wireless network communication party and a second wireless network communication party respectively and simultaneously detect RSS information of a wireless channel and transmit the information to each other, and the first wireless network communication party and the second wireless network communication party operate in the steps of inconsistent removal, vector quantization and fuzzy extraction and ultimately obtain identical bit streams to be used as encrypted secrete keys. The bit generation rate can reach 284%, and random bit streams can be quickly provided for authentication encrypted algorithms of the two communication parties in a wireless network environment to serve as the encrypted secrete keys; the zero error rate can be achieved through the two communication parties, it can be guaranteed that the two communication parties reliably generate the identical bit streams to be used as the encrypted secrete keys, and stability of the method in the operation process is guaranteed; the bit streams produced in the method can pass an NIST randomness test, the produced random bit streams can be used as the secrete keys, and safe communication of the two communication parties is guaranteed.
Owner:XIDIAN UNIV

Internet of Things equipment identity security authentication method based on block chain and fog computing

The invention discloses an Internet of Things equipment identity security authentication method based on a block chain and fog computing, and the method specifically comprises the steps that: an equipment manager generates a random key, writes the key into Internet of Things equipment, and transmits the key to a fog node close to the equipment; the fog node encrypts the random key and then sends the encrypted random key to the equipment manager; the equipment manager writes related information of the Internet of Things equipment into the block chain; the fog node queries the block chain through the serial number of the Internet of Things equipment to obtain related information of the Internet of Things equipment; the fog node verifies whether the serial number of the equipment stored in the block chain is the same as the serial number of the equipment itself through an equipment identity security protocol DSCP, the fog node authentication stage is completed, and then the fog node adds a mapping and equipment access validity period for the Internet of Things equipment; after the Internet of Things equipment completes registration and authentication, mutual authentication can be carried out between the equipment. According to the method, the blockchain and fog computing are utilized to help the Internet of Things to ensure the security of the equipment and realize mutual authentication between the equipment.
Owner:成都极略科技有限公司

Distributed unmanned aerial vehicle cluster network security communication implementation method

The invention relates to the technical field of unmanned aerial vehicle cluster communication, and discloses a distributed unmanned aerial vehicle cluster network security communication implementationmethod, which is small in information flux and high in maneuverability through autonomous decision making of cooperative unmanned aerial vehicles in a dis The cooperative UAVs establish communicationwith other cooperative UAVs after being authenticated by an authentication mechanism, send action tasks or formation aggregation requests to other cooperative UAVs, obtain replies of half or more accepted tasks, approve the action requests, and take the cooperative UAVs which do not participate in decision making and do not accept the action requests as learners, And learning from any cooperativeunmanned aerial vehicle receiving the action request to achieve a consistent task request or formation aggregation request, so that all cooperative unmanned aerial vehicles in the unmanned aerial vehicle cluster perform a target task in a formation manner, the consistency of the unmanned aerial vehicle cluster is ensured, and meanwhile, the secure communication among the unmanned aerial vehiclescan be ensured. Hackers are effectively prevented from invading the unmanned aerial vehicle cluster to change the target task of the unmanned aerial vehicle cluster.
Owner:CHONGQING JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products