Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

35results about How to "Fast decryption" patented technology

Method for encrypting and decrypting streaming document and device thereof

The invention relates to the field of digital publishing, and discloses a method for encrypting and decrypting a streaming document and a device thereof. According to the method, each part of one streaming document is encrypted at different encrypting grades, general contents can be encrypted by adopting a low-security-level rapid encryption algorithm, and important contents are encrypted by adopting a high-security-level safety encryption algorithm, so that the overall encryption speed of the document is increased, the demand on computing resources in a computer system is lowered, and the security of the important contents is ensured. Each part of one streaming document is encrypted by adopting different encrypting grades, and the contents of a low encryption security level can be decrypted rapidly, so that the overall decryption speed of the document is increased. At a lowest encryption security level, encryption is not performed, so that computer resources needed by encryption can be further reduced; parts of contents of the streaming document do not need to be decrypted during use, so that the demand of terminal equipment on computing resources is lowered; the method and the device are particularly suitable for trial reading of parts of chapters.
Owner:JIEFANG DAILY NEWSPAPER GRP

Password authentication method for internet of things by adopting security one-key management technology

The invention discloses a password authentication method for an internet of things by adopting a security one-key management technology. According to the method, an internet of things security protocol is established by an authentication or a signature key, and the authentication or signature key is encrypted by transmission keys to ensure the security of the process of exchanging and transmitting the authentication or signature key; all transmission keys corresponding to a sensing node end are respectively encrypted by a storage key, to ensure the storage security of the transmission keys on the authentication center end; more encrypting cards are not required to be purchased to store a great amount of transmission keys when the quantity of the sensing node equipment is comparatively great, thereby greatly saving the cost of constructing the authentication center; a security one-key management method is adopted to solve a difficulty on the key updating and management of the one-key password algorithm in the internet of things security protocol, to reduce the cost of one-key updating and maintenance; meanwhile, the advantages of rapid encrypting and decrypting speeds of the one-key password algorithm are developed to effectively improve the operating speed of the internet of things security protocol, thereby establishing an internet of things password authentication system by adopting the security one-key management technology.
Owner:胡祥义

BGN type cryptograph decryption outsourcing scheme based on attributes

The invention particularly relates to a BGN type cryptograph decryption outsourcing scheme based on attributes. The scheme comprises steps that (1), a system parameter is set, and an encryption secret key is generated; (2), an access structure is selected by a sending side, message encryption is carried out, and cryptograph is generated; (3), a main secret key and the attributes are inputted by a receiving side, and a conversion secret key and a private secret key are outputted; (4), the cryptograph is sent by the sending side to a cloud end; (5), the conversion secret key is sent to the cloud end by the receiving side; (6), the cryptograph is converted by the cloud end through utilizing the conversion secret key to acquire a part of the cryptograph which is sent to the receiving side; and (7), the private secret key is utilized by the receiving side to decrypt the part of the cryptograph to acquire a message, and homomorphic computation operation for the cryptograph carried out by the cloud end is further comprised between the step (4) and the step (5). The scheme is advantaged in that not only can system decryption efficiency be improved, but also storage cost of a receiver is reduced; according to the cryptograph acquired according to the encryption method, a server is permitted to carry out multiple addition homomorphic operation and multiplication homomorphic operation for cryptograph data, on the condition that decryption difficulty does not increase, CPA safety of the user information is substantially improved.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Encryption transmission method and device and decryption playing method and device of multimedia file

The invention discloses an encryption transmission method and device and decryption playing method and device of a multimedia file, and relates to the field of information security. The main purpose is to solve the problems that the encryption is relatively complex and the decryption playing speed of the multimedia file is low. The technical scheme provided by the invention comprises following steps of firstly, obtaining the encryption mode of the multimedia file corresponding to a multimedia file identifier, the length information of an encryption secret key and the encryption secret key; through taking the length of the encryption secret key as a unit, carrying out preset logic operations to the data in the multimedia file and the encryption secret key, thus obtaining an encrypted multimedia file; through taking the encryption mode and the length information of the encryption secret key as an encryption file header, according to a front to back sequence of the encryption file header, the encryption secret key and the encrypted multimedia file, generating an encrypted data file; and finally, sending the encrypted data file to a client. The methods and the devices are mainly used for carrying out encryption transmission and decryption playing to the multimedia file.
Owner:BEIJING QIHOO TECH CO LTD +1

Methods and apparatus for data and signal encryption and decryption by irregular subspace leaping

A data/signal encryption/scrambling and decryption system and methods for constructing said system from irregular subspace leaping. A data/signal is mounted from the first/previous subspace to the second/subsequent subspace. A non-orthogonal complement subspace of the first/previous subspace in the second/subsequent subspace is generated, and spanned by the y-vectors. An encrypting/scrambling data component is generated by either a random combination of the said y-vectors, or by a projection of a partially coherent (with the given data/signal) data onto the span of y-vectors. The encrypting/scrambling is then carried out by combining the given data/signal with the said scrambling data component. The decryption method makes use of pseudoframes for subspace. A set of x-vectors associated with the said y-vectors are evaluated under the principle that the span of x-vectors is orthogonal to the span of y-vectors, and an orthogonal projection of the span of x-vectors covers the first/previous subspace. The said x-vectors forms a pseudoframe for the first/previous subspace. A dual pseudoframe sequence is determined and the decryption is carried out using the pseudoframe expansion with sequences x-vectors and its pseudoframe dual. The said method is fast since it operates on relatively small segments of the data set. The said method has the characteristics that the said scrambling data component is completely unknown to anyone including the message generator/sender, and the said non-orthogonal complementary subspaces have nearly infinite many choices. The combination of the above two uncertainties ensures high security of the present methods.
Owner:LI SHIDONG

Encryption method based on DES

An encryption method based on DES comprises the following steps: randomly obtaining a character string with the length being x and used for logical operation from a file to be encrypted; dividing the file to be encrypted into sections with the length of being y, wherein y is more than and equal to x, the length of the final section is set as z, and z is less than or equal to y; conducting left alignment and right alignment on the subsections and the character string, and conducting logical operation with the character string so as to generate the encryption file, when the subsections and the character string are in the left alignment, conducting the logical operation with x bit on the left haft part, and when the subsections and the character string are in the right alignment, conducting the logical operation with x bit on the right half part, and if z is more than or equal to x, conducting the logical operation with x bit on the final small section, or conducting the logical operation with z bit; and by the DES algorithm, encrypting the character string to obtain encrypted logic element, and then appending the content and the length of the logic element, the length of the character string, and user-defined mark sections behind the encryption file. The method has the advantages that the rapid for decryption is quick, the requirement of playing when conducting decryption is met, and the encryption scheme is flexible.
Owner:FUJIAN STAR NET EVIDEO INFORMATION SYST CO LTD

Decryption device and method and system on chip

The invention provides a decryption device and method and a system on chip, the decryption device comprises a decryption control circuit and a decryption circuit, and the decryption circuit comprisesa plurality of decryption sub-circuits. The decryption control circuit is used for receiving the first decryption configuration information sent by a processor, and the first decryption configurationinformation comprises the first control information for enabling the decryption control circuit and a memory address. The decryption control circuit is also used for reading the second decryption configuration information used for representing a corresponding decryption algorithm from the memory address according to the first control information, and generating a control signal corresponding to the decryption algorithm according to the second decryption configuration information. The decryption circuit is used for selecting a corresponding sub-decryption circuit according to a decryption algorithm corresponding to the control signal; and the sub-decryption circuit is used for decrypting the encrypted data to obtain decrypted data. According to the method, the decryption speed is greatly improved, and the delay caused by decryption is very small, so that the influence on the storage experience of a user is very small.
Owner:ALLWINNER TECH CO LTD

Rapid decryption method for homomorphic encryption scheme

The invention relates to the technical field of data security, in particular to a quick decryption method for a homomorphic encryption scheme, which comprises the following steps: an encryption user and a decryption user appoint the used homomorphic encryption scheme in advance, and user sides of the two parties precompute system parameters; the decryption user side receives the encrypted ciphertext; after the decryption user side receives the ciphertext, ciphertext parameters are calculated; performing plaintext recovery on the ciphertext parameter by adopting an improved BSGS algorithm according to the obtained system parameter to obtain a plaintext; if the decryption algorithm of the homomorphic encryption scheme needs to verify the decryption result, ciphertext verification is carried out, namely, if the verification result is correct, the decryption result is output, and if the verification result is wrong, decryption fails; according to the method, the discrete logarithm problem can be rapidly solved when the power exponent is small, and certain universality is achieved; compared with the traditional homomorphic encryption scheme, the fast decryption method provided by the invention can improve the decryption speed of the homomorphic encryption scheme by more than 10 times.
Owner:北京数牍科技有限公司

An Attribute-Based Outsourcing Scheme for Bgn-type Ciphertext Decryption

The invention particularly relates to a BGN type cryptograph decryption outsourcing scheme based on attributes. The scheme comprises steps that (1), a system parameter is set, and an encryption secret key is generated; (2), an access structure is selected by a sending side, message encryption is carried out, and cryptograph is generated; (3), a main secret key and the attributes are inputted by a receiving side, and a conversion secret key and a private secret key are outputted; (4), the cryptograph is sent by the sending side to a cloud end; (5), the conversion secret key is sent to the cloud end by the receiving side; (6), the cryptograph is converted by the cloud end through utilizing the conversion secret key to acquire a part of the cryptograph which is sent to the receiving side; and (7), the private secret key is utilized by the receiving side to decrypt the part of the cryptograph to acquire a message, and homomorphic computation operation for the cryptograph carried out by the cloud end is further comprised between the step (4) and the step (5). The scheme is advantaged in that not only can system decryption efficiency be improved, but also storage cost of a receiver is reduced; according to the cryptograph acquired according to the encryption method, a server is permitted to carry out multiple addition homomorphic operation and multiplication homomorphic operation for cryptograph data, on the condition that decryption difficulty does not increase, CPA safety of the user information is substantially improved.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Upper computer communication encryption method and system

The invention discloses an upper computer communication encryption method and system, and the method comprises the steps: carrying out the confusion processing of a communication instruction between an upper computer and equipment before the communication between the upper computer and the equipment, and obtaining a confusion signal, wherein the communication instruction comprises an obfuscation code and a plurality of function codes, the obfuscation code is randomly interspersed among part of the function codes, the function codes are used for indicating various functions of the equipment, and the equipment acquires execution data according to the indication of the function codes and executes the corresponding functions; encrypting the confusion signal by adopting an asymmetric encryption algorithm to obtain an encrypted signal; when the upper computer communicates with the equipment, performing communication through the encrypted signal; and after the encrypted signal is received, performing decryption firstly, then removing the confusion code, and obtaining and executing a communication instruction. The encryption strategy is flexible and difficult to crack, and the decryption speed is high; and therefore, instructions of the upper computer are not easy to crack, product equipment is not easy to control by a counterfeit upper computer, and important data are not illegally tampered or peeped.
Owner:SICHUAN HUSHAN ELECTRIC APPLIANCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products