Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

112results about How to "Ensure transmission security" patented technology

Safety data repetition removing method and system applicable to backup system

The invention discloses a safety data repetition removing method applicable to a backup system. The method includes the following steps that a backup request submitted by a user is received; all files needing backup are partitioned and multiple data blocks of different sizes are obtained; the Hash algorithm is used for calculating the Hash value F1 of each data block, wherein the Hash values F1 serve as encrypting keys of the data blocks; the Hash algorithm is used again for calculating the Hash value F2 of the Hash value F1 of each data block, wherein the Hash values F2 serve as fingerprints of the data blocks to identify repeated data blocks and the classic encryption algorithm and a private key of the user are used for encrypting the Hash values F1 of the data blocks to obtain ciphertexts E (F1) of the Hash values F1 of the data in order to protect the encrypting keys of the data blocks. All the data block fingerprints F2 and the like are packaged in sequence into fingerprint segments which are transmitted to a storage server. The SSL protocol is adopted in all communication processes. According to the safety data repetition removing method applicable to the backup system, the safety data repetition removing method is adopted to ensure that storage safety problem that data are lost or tampered is solved under the condition that the data repetition removing rate is not changed.
Owner:HUAZHONG UNIV OF SCI & TECH

Lightweight authentication method based on equipment identity label and gateway

The embodiment of the invention discloses a lightweight authentication method based on an equipment identity label and a gateway. The lightweight authentication method based on the equipment identitylabel comprises a registration method and an authentication method, the registration method comprises the following steps: in response to a registration application request, obtaining the identity information of a terminal sending the registration application request; generating a terminal ID public key based on the identity information; obtaining an encrypted private key and a signed public key of the terminal based on the terminal ID public key; obtaining a session key obtained by negotiation with the terminal; encrypting the encrypted private key and the signed public key based on the session key to obtain first encrypted information; and sending the first encrypted information to the terminal. In the transmission communication of the encrypted private key and the signed public key, thesession key obtained by negotiation with the terminal is used to encrypt the communication, so that the transmission security of the encrypted private key and the signed public key is ensured, and the purpose of improving the security in lightweight registration authentication is achieved.
Owner:STATE GRID SHANXI ELECTRIC POWER +1

Method and system for the quick-speed and safe distribution of file based on P2P

The invention discloses a method for the quick-speed and safe distribution of the file based on the P2P,including that: a, a proclaimed file is in the symmetric encrypting to form an encrypted file before being distributed and transferred, and the encrypted file is made into a seed file, which is placed in the service end and distributed in the P2P way; b, the customer end logins according to the user information, the seed file is selected and downloaded in the P2P way, then the customer is in the identity verification; c, the service end distributes the encryption key of the encrypted file for the certificated customer; d, the customer end obtains the proclaimed file through the symmetric deciphering of the encryption key and the encrypted file. The invention also discloses a system for the quick-speed and safe distribution of the file based on the P2P, comprising a service end and a customer end, wherein the service end comprises a data-base, a seed file list server, a P2P download tracking server and a file uploading server, the customer end comprises a seed file reading module, a P2P downloading module and a deciphering module. The method can satisfy the requirement for safely and quickly distributing and transferring the file under the certain condition.
Owner:ZHEJIANG UNIV

Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology

The present invention discloses a cloud data security protection method adopting a fully homomorphic encryption technology and a multiple digital watermarking technology. The cloud data security protection method is characterized in that in a cloud computing environment, a trusted third-party organization distributes a key to a user, after the user stores the key, a fully homomorphic encryption scheme is adopted to encrypt to-be-uploaded data at a user side, then the encrypted data is uploaded to a cloud side, thereby ensuring transmission security and storage security of data; in addition, when the user searches for data, direct search for ciphertext can be performed after a search keyword is encrypted, thereby improving search efficiency; and moreover, before the data is uploaded to the cloud side, a fragile watermarking and a robust watermarking are respectively embedded into the to-be-uploaded data, the purpose of embedding of the fragile watermarking is to prevent illegal modification of the data, so as to achieve authentication for integrity of the data, and the purpose of embedding of the robust watermarking is to protect copyright of the data, so as to achieve authentication for copyright of the data.
Owner:JIANGSU BOZHI SOFTWARE TECH CO LTD

Electronic digital information copyright protection method and system as well as electronic terminal

The invention provides an electronic digital information copyright protection method and system as well as an electronic terminal. The method comprises: the electronic terminal transmits an electronic digital information downloading request to a server; the server encrypts the electronic digital information by use of an encryption key to obtain encrypted digital information; the server transmits the encrypted digital information to the electronic terminal; the electronic terminal receives and stores the encrypted digital information; and the electronic terminal determines whether to decrypt the encrypted digital information by use of a decryption key, and if yes, displaying the decrypted electronic digital information or forwarding the decrypted electronic digital information meeting a preset forwarding condition or a user-defined forwarding condition. Because the electronic digital information to be distributed or stored is encrypted by the encryption key, the encrypted electronic digital information has to be decrypted before being displayed for forwarded by a user, so that only the authorized user can process the electronic digital information, thereby protecting the copyright of the electronic digital information occupier.
Owner:YINGHUADA (SHANGHAI) ELECTRONIC CO LTD

Secure transmission method based on relay strategy selection and resource allocation in relay OFDM (Orthogonal Frequency Division Multiplexing) network

The invention discloses a secure transmission method based on relay strategy selection and resource allocation in a relay OFDM (Orthogonal Frequency Division Multiplexing) network. A communication system model employed by the method comprises a sending node S, N destination receiving nodes (D <1>...D <N >), an eavesdropping node Eve and K relay nodes. The method comprises the steps of for data transmission of each time, in a second time slot, after relay strategy selection and resource allocation, sending data to the relay nodes by the sending node S; and in a second time slot, selecting one of the K relay nodes as a forwarding node to forward the data received in the first time slot to the destination node D, and moreover, eavesdropping information sent to N users by the eavesdropping node Eve. Compared with traditional modes of merely employing AF (Amplify-and-Forward) or DF (Decode-and-Forward), the method has the advantages that a lower private interruption probability is obtained in a relay strategy selection mode, and the performance difference between the method and the two traditional modes is more remarkable under a high signal to noise ratio.
Owner:XI AN JIAOTONG UNIV

Quantum secret key synchronization method for distribution terminal

The invention discloses a quantum secret key synchronization method for a distribution terminal. Sharing quantum secret keys are separately stored in quantum secret key downloading interfaces A and Bthrough distributing a unique ID for each quantum secret key, the quantum secret keys are transmitted via a method that uses a third-party safe storage medium as a medium, the quantum secret keys needed by the distribution terminal are acquired from the quantum secret key downloading interfaces via the third-party safe storage medium, and then the third-party safe storage medium is connected withthe physical interfaces of the distribution terminal one by one for transmitting the quantum secret keys to the distribution terminal. The quantum secret key synchronization method for the distribution terminal provided by the invention is the method that distributes the secret key pools formed at each distribution terminal based on the quantum secret keys in an off-line manner and negotiates ID based on the quantum secret keys; aiming at the service security protection level requirement, the two quantum secret key synchronization methods are combined, and thus the channel utilization rate isimproved, and the transmission security of the quantum secret key ID during a negotiation synchronization process is ensured.
Owner:STATE GRID INFORMATION & TELECOMM GRP +4

Electronic file access control method and system based on hierarchical security encryption

InactiveCN110502918AProtection securityImplement multi-level securityDigital data protectionKey distributionSecurity level
The invention discloses an electronic file access control method and system based on hierarchical security encryption. The electronic file access control method includes the steps: firstly, setting the security level of an electronic file, then distributing a grading key to an electronic file sender, carrying out grading encryption on the electronic file, carrying out grading access control, and finally updating the key. The electronic file access control system comprises a user registration/management module, an electronic file security classification management module, an electronic file classification encryption module, an electronic file classification decryption module, a key distribution management module, a key calculation recovery module, an electronic file sending/receiving moduleand a database module. According to the invention, the electronic file is encrypted in a graded manner according to the security level of the electronic file, and graded decryption and access controlare performed on the electronic file according to the security level of the user, so that the multi-level security of the electronic file is realized, and the security of the electronic file is effectively protected. Through hierarchical encryption and hierarchical decryption, hierarchical access control of the electronic file is realized.
Owner:HANGZHOU DIANZI UNIV

Remote distance wireless transmission method

The invention provides a remote wireless transmitting method for self-adaptively adjusting optimum modulation modes under the precondition that the communication quality is guaranteed. The modulation mode comprises: sending a series of test data to an information sink by an information source, determining to adopt one of QPSK, 16QAM, 64QAM or 126QAM as a transmission system according to the bit error rate and the transmission speed of the test data by the information sink, feeding back to the information source, modulating to a corresponding transmission system according to feedback information of the information sink by the information source, then, sending data to the information sink, selecting a suitable transmission system according to the bit error rate and the transmission speed of received data by the information sink, feeding back to the information source, adjusting a corresponding transmission system and the speed in real time according to the feedback information of the information sink by the information source, sending the data to the information sink, and thereby self-adaptively realizing the optimization of the data transmission efficiency according to the transmission environment and the speed demands. The method is applied in wireless data digital transmission with long distance and high speed.
Owner:林志华

Quality management system for finished automobile production and manufacturing

The invention discloses a quality management system for finished automobile production and manufacturing. The system is composed of a quality dictionary module, a quality planning module, a quality inspection module, and a quality control module. The quality dictionary module is used for carrying out quantification processing on characteristic attributes, defect types, coding rules of different batches, and national standards of inspection items during a production and manufacturing process and constructing essential data by using an integrated and standardized description as criteria for later-period inspection. The quality planning module is used for creating targeted inspection plans based on business demands and inspection objects. The quality inspection module is used for applying designated inspection plans to specific inspection objects based on inspection plans created in the quality planning, collecting quality data and synchronizing the data to a server side to complete product quality inspection. The quality control module is used for completing inspection on the specific inspection objects in quality inspection and realizing quality control on the same batches of inspection objects with the same batch number prefix positions.
Owner:BEIJING UNIV OF TECH

Internal and external network document interaction method

The invention discloses an internal and external network document interaction method. A document storage service system is deployed in an internal network and a document transfer service system is deployed in an external network, wherein the document storage service system is used for storing user documents, the document transfer service system is used for uploading the documents to the internal network or downloading the documents from the internal network, and a document flow is transmitted through a http request between servers. The internal and external network document interaction method disclosed by the invention has the following advantages: a more comprehensive consideration of the system security is provided; firstly, user accounts are independent, the external network cannot fully access the data of the internal network, and thus the security of each user document can be ensured; the documents that require to transfer from the internal network must be reviewed by document auditors before transfer, and thus a layer of protection is also added to the document security; secondly, an audit function is added, and if the documents are leaked, the leakage personnel can be determined through the function; and the document flow is transmitted through the http request between the servers, the data can be hardly intercepted from outside, and thus the transmission security of the data can be guaranteed.
Owner:JIANGSU DAWN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products