Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

65results about How to "Ensure secure transmission" patented technology

Cooperative relay security transmission method based on artificial noise interference

ActiveCN105515717AEnsure secure transmissionReduce the received signal to interference and noise ratioCommunication jammingSecure transmissionTransfer procedure
The invention discloses a cooperative relay security transmission method based on artificial noise interference, wherein the whole transmission process is completed in two time slots; in the first time slot, an information source broadcasts available information fused with artificial noise to a relay and an eavesdropper, and before broadcasting, the artificial noise is pre-coded by a null space orthogonal base of a channel from the information source to the relay, and the available information is pre-coded by using a maximal ratio transmission strategy; and in the second time slot, the relay decodes and transmits the received information, and meanwhile the information source sends the artificial noise to interfere the receiving of the eavesdropper. According to the cooperative relay security transmission method based on artificial noise interference, as interferences are implemented in both the two transmission time slots for the eavesdropper, the reception signal-to-interference-and-noise-ratio of the eavesdropper can be effectively reduced, thereby the system security performance is enhanced, and the security transmission of the information is ensured; in addition, in order to improve the use ratio of the system power, the power can be set through working out the optimal power distribution factor of the system, and thereby the optimal system security performance can be achieved with the lowest power consumption.
Owner:HUAQIAO UNIVERSITY

Anonymous safety communication method applicable to MANET (mobile ad-hoc network) network layer

InactiveCN106453428AProtect Identity Information SecurityProtection securityTransmissionSecurity arrangementMaster keyData transmission
The invention provides an anonymous safety communication method applicable to an MANET (mobile ad-hoc network) network layer. The anonymous safety communication method includes a system initializing step, a shared-key negotiation step, a route discovery step and a data sending step. In the system initializing step, a PKG (private key generator) generates a master key and network public parameters, the master key is kept by the PKG, and the network public parameters are published to all nodes in a network; the PKG generates a public key and a private key both corresponding to each node according to ID (identification) of each node, publishes the public keys to all the nodes and publishes the private keys to the corresponding nodes. In the shared-key negotiation step, negotiation on a shared key and a communication sequence number between a source node and a target node is achieved according to an IBE (identity-based encryption) protocol, and the shared key is a symmetrical key. In the route discovery step, an anonymous route path between the source node and the target node is established according to the negotiated shared key and the negotiated communication sequence number on the basis of an onion encryption protocol. In the data sending step, data transmission from the source node to the target node along the anonymous route path is achieved by the onion encryption protocol. By the anonymous safety communication method, identity information safety, position information safety and route information safety of the nodes in the network can be protected effectively.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

Vehicular electronic secure communication system and communication method

The invention provides a vehicular electronic secure communication system. The vehicular electronic secure communication system comprises a secure chip, a vehicular electronic system and an automobile service platform; the vehicular electronic system and the automobile service platform perform bidirectional identity authentication; the vehicular electronic system comprises an ECU control system; the ECU control system and the automobile service platform perform bidirectional signature authentication through the secure chip; and, after bidirectional signature is successfully verified, the automobile service platform and the ECU control system are in encrypted communication. The invention further provides a communication method of the vehicular electronic secure communication system. The communication method comprises the following steps that: (1), the vehicular electronic system and the automobile service platform perform bidirectional identity authentication; (2), after verification is successful, the ECU control system of the vehicular electronic system and the automobile service platform perform bidirectional signature authentication through the secure chip; and (3), after verification is successful, the automobile service platform and the ECU control system are in encrypted communication through a session key output by the secure chip.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Secure transmission method adopting information source and relay-combined transmitting antenna selection

The invention relates to a secure transmission method adopting information source and relay-combined transmitting antenna selection. The method includes the following steps that: in a first time slot, and an information source obtains channel state information from a relay and selects an antenna which makes the received signal to noise of the relay maximum to broadcast confidential signals according to the channel state information, and other three nodes receive signals through adopting maximal-ratio combining; in a second time slot, the relay adaptively decodes a forwarding protocol, when the relay can correctly decode the forwarding protocol, the relay obtains channel state information from an information sink and selects one antenna which makes the received signal to noise of the information sink maximum to forward confidential signals according to the channel state information from the information sink; and when the relay cannot correctly decode the forwarding protocol, the information source obtains the channel state information from the information sink and selects an antenna which makes the received signal to noise of the information sink maximum to retransmit the confidential signals in the first time slot, and the information sink and the relay receive the signals with maximal-ratio combining. According to the method of the invention, transmitting antenna selection technology is adopted to maximize the received signal to noise ratio of the relay or the information sink, and the received signal to noise ratio of an eavesdropper can be decreased, and low complexity and high security can be achieved.
Owner:HUAQIAO UNIVERSITY

Method for controlling communication security of unmanned aerial vehicle assisted cognitive radio network

The invention relates to a method for controlling the communication security of an unmanned aerial vehicle assisted cognitive wireless network. The method comprises the following steps: step S201, establishing a communication model of unmanned aerial vehicle-to-ground wireless communication; step S203, determining each parameter in the communication model; s205, establishing a non-convex optimization problem model according to each parameter in the communication model; s207, converting the non-convex optimization problem model into a convex optimization problem model by using a slack variableand a continuous convex approximation method; and S209, according to the convex optimization problem model, determining the target flight path and the target transmitting power of the unmanned aerialvehicle and the average secrecy rate of the secondary user receiving end under the worst condition. According to the method, the average secrecy rate of the secondary user receiving end under the worst condition is maximized by jointly optimizing the flight path and the transmitting power of the unmanned aerial vehicle within the given flight time, so that safe transmission of information is effectively guaranteed.
Owner:SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI

Power distribution energy collection delay secure transmission scheme of target user scrambling

The invention discloses a power distribution energy collection delay secure transmission scheme of target user scrambling. The scheme comprises: the relay selects a user node having the maximum channel power gain from all target user nodes to serve a legal user in a first time slot, and uses the residual unselected user nodes as potential eavesdropping users, a signal source sends useful information to the relay, the legal user sends a scrambled signal to the relay, a relay node applies the power of the received signal to energy collection and uses the residual power for receiving the useful information sent by the signal source and the scrambled signal sent by the legal user; and in a second time slot, the relay broadcasts the received signal to a host, and the host contains the legal user and the potential eavesdropping users. The power distribution energy collection delay secure transmission scheme combines the cooperative scrambling technology with the information simultaneous interpretation technology reasonably, so that the receiving signal to noise ratio of an eavesdropping channel is reduced, the security performance of the network is improved, and thus the secure transmission of information is ensured.
Owner:HUAQIAO UNIVERSITY

Time-division energy harvesting relay secure transmission scheme based on destination user scrambling

The invention discloses a time-division energy harvesting relay secure transmission scheme based on destination user scrambling. The scheme comprises the following steps: in a first time slot, a relay converts a received radio frequency signal into energy through an energy harvesting technology; in a second Time slot, the relay selects one destination user with the largest channel power gain from multiple destination users as a legal user and serves the legal user, remaining unselected destination users serve as potential eavesdropping users, a source sends useful information to the relay, and the legal destination user sends a scrambled signal to the relay; and in a third time slot, after the signal received by the relay is amplified, the signal is broadcast to a destination by use of energy obtained in the first time slot, wherein the destination includes the selected legal user and the potential eavesdropping users. According to the invention, by combining a cooperative scrambling technology with a time-division energy harvesting technology reasonably, the receiving signal-to-noise ratio of an eavesdropping channel is reduced, the network security performance is improved, and safe transmission of the information is guaranteed.
Owner:HUAQIAO UNIVERSITY

Remote proving method applicable to emergency rescue platform

The invention provides a remote proving method applicable to emergency rescue platform. The remote providing method comprises the steps that a proving terminal sends an identity authentication request to a cluster administrator; the cluster administrator verifies the identity of the proving terminal; if passing the verification, the proving terminal acquires measurement information of a platform where the proving terminal is positioned, signs the measurement information by adopting a cluster signing scheme and sends the signed measurement information to an inquiry terminal; the inquiry terminal verifies whether the signature is effective according to a cluster verification scheme and inquires whether the measurement information is credible from the cluster administrator; only if the signature is effective and the measurement information is credible, the inquiry terminal confirms that the proving terminal is credible. The remote proving method has the advantages that the problem of credibility proving of a terminal can be effectively resolved, and the authenticity of data and secure transmission of the data are guaranteed; meanwhile, the remote proving method has the characteristic of proving traceability, and identity forgery attack and malicious fraud attack can be effectively resisted.
Owner:BEIJING BUSINESS INTELLIGENCE & COMM TECH +1

Artificial intelligence partial discharge monitoring and distinguishing system and method based on cloud technology

The invention provides an artificial intelligence partial discharge real-time monitoring and distinguishing method based on a cloud technology. The method comprises the following steps: S1, detectinga partial discharge signal on a cable line in real time through a partial discharge sensor; s2, a partial discharge on-site signal processing device acquires a partial discharge signal and processes the partial discharge signal to form intermediate data; s3, obtaining the intermediate data through a cloud server, carrying out the safety processing to form test data, and then carrying out the storage analysis; and S4, acquiring test data through the intelligent terminal and displaying the test data. The invention further provides an artificial intelligence partial discharge monitoring and distinguishing system based on the cloud technology utilizing the method. The system comprises the partial discharge sensor, the partial discharge on-site signal processing device, the cloud server and theintelligent terminal. According to the invention, sharing of test data is realized based on a cloud technology and a wireless transmission technology, partial discharge test experts in different areas can remotely support and judge partial discharge at any time, and the requirement on test personnel is not high.
Owner:GUANGDONG POWER GRID CO LTD +1

Wireless single-input single-output vector synthesis secure transmission method based on RIS

The invention discloses a wireless single-input single-output vector synthesis secure transmission method based on an RIS (Radio Information System), which mainly solves the problem of ensuring the information security of a physical layer of a single-input single-output system in the existing RIS-assisted wireless transmission technology. Comprising the steps that a single-antenna transmitting end transmits a signal to be synthesized, and the signal is designed according to known channel state information; then, for randomly selecting RIS array element reflection coefficients, respectively designing two RIS reflected signal vector synthesis signal transmission schemes with different implementation complexity so as to realize vector synthesis of received signals by a legal receiving end and obtain regular receiving constellation symbols, but the received signals at an eavesdropping end keep random disturbance, and ideal synthesis processing cannot be realized; and finally, the legal receiving end and the eavesdropping end respectively detect and decode the received signals obtained by the legal receiving end and the eavesdropping end. According to the invention, the security of information transmission can be guaranteed, the reliability of information transmission is effectively improved, and the hardware implementation cost of the RIS control end is low.
Owner:XIAN UNIV OF POSTS & TELECOMM

Geological disaster monitoring data transmission method and system, electronic equipment and storage medium

The invention provides a geological disaster monitoring data transmission method and system, electronic equipment and a storage medium, and the method comprises the steps: S1, selecting a GPRS connection server, judging whether the GPRS connection is successful, and if the GPRS connection is successful, executing S2; if the GPRS connection is not successful within the preset threshold value, executing S3; S2, transmitting the geological disaster monitoring data to the server by using GPRS (General Packet Radio Service); S3, selecting the space-based Internet of Things to be connected with the server, and starting a space-based Internet-of- Things satellite module to search satellites; if the satellite modules are successfully docked, executing S4; if the docking of the satellite modules is not successful within the preset threshold value, executing S5; S4, geological disaster monitoring data are transmitted to the server through the space-based Internet of Things; and S5, storing the geological disaster monitoring data. According to the invention, safe transmission of monitoring data under different network conditions can be guaranteed, and mutual intelligent switching of two communication modes is supported.
Owner:中国地质环境监测院

Multi-modal marine environment data fusion acquisition system and method

The invention relates to a multi-modal marine environment data fusion acquisition system and method. The multi-modal marine environment data fusion acquisition system comprises a plurality of marine environment data acquisition stations, an unmanned ship and a data statistics server, wherein the marine environment data acquisition stations are distributed at marine data acquisition points, and thedata statistics server stores acquisition positions of the marine data acquisition points and ID numbers of the corresponding marine environment acquisition stations; the marine environment acquisition station comprises a camera, a voice input device, a text input device, a display screen, an acquisition station controller and a first data storage device; the camera is arranged on a rotating support, and the rotating support drives the camera to continuously rotate according to a preset rotating speed, and the camera collects video data, and the voice input device is used for collecting voicedata of a user; and the text input device is used for collecting text data of the user. The invention provides a multi-modal data acquisition form, capable of improving the data acquisition efficiency, and being richer in the acquired data types.
Owner:ZHOUSHAN OCEAN UNIV SCI & TECH RES INST CO LTD

Control system and control method for wet-type electrostatic dust collector of coal conveying system

The invention relates to a control system and a control method for a wet-type electrostatic dust collector of a coal conveying system. Existing electrostatic dust collectors mostly adopt a one-supporting-one design on site, that is, a set of complete dust collector control system is only used by one belt, and meanwhile, a traditional wet type electrostatic dust collector can only meet the requirement for on-site dust suppression and cannot feed back on-site conditions in the first time. The control system for the wet type electrostatic dust collector of the coal conveying system comprises a dust collector (26), an induced draft fan (23), a belt air suction cover A (24) and a belt air suction cover B (25), wherein the belt air suction cover A is connected with an A-path belt drawer type filter (1), the belt air suction cover B is connected with a B-path belt drawer type filter (2), the A-path belt drawer type filter is connected with an A-path belt electric butterfly valve (3), and the B-path belt drawer type filter is connected with a B-path belt electric butterfly valve (4). The system and the method are applied to the electrostatic dust collector.
Owner:GUANGDONG DATANG INT CHAOZHOU POWER GENERATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products