Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

129results about How to "Fast encryption and decryption" patented technology

Digital content safeguard system based on transparent encryption and decryption method thereof

The invention belongs to the field of information safety, providing a digital content safeguard system based on transparent encryption and decryption. The system comprises a transparent encryption and decryption module, an access control module, a monitoring module, a certificate authority module, a communication proxy module, a management center and a permission server module, wherein the transparent encryption and decryption module, the access control module and the monitoring module are on a client side, and the management center and the permission server module are on a server side; the client side and the server side are connected by the communication proxy module and the permission server module. Aiming at the safeguard system, the invention provides a dynamic encryption and decryption method which carries out encryption and access control to digital content as well as opens, reads and writes cipher texts. The method realizes transparent encryption and decryption to the digital content by realizing filtering driving on the bottom layer of an operating system and records an intact log to all operation of a user, thus improving system safety, and greatly improving encryption and decryption speed. Compared with the existing like products, the system of the invention has the advantages of safe and efficient encryption mode, fine grit access control, perfect log audit function and convenient and efficient management mode.
Owner:NORTHWEST UNIV(CN)

Method for designing AES (Advanced Encryption Standard) encryption chip based on FPGA (Field Programmable Gate Array) and embedded encryption system

The invention discloses a method for designing an AES (Advanced Encryption Standard) encryption chip based on an FPGA (Field Programmable Gate Array), which is designed for aiming at the requirement of an embedded system. The AES encryption chip not only can be used in a manner of a solid chip but also used in a manner of a software module. Three operation modes of ECB (Electronic Code Book), CBC (Cipher Block Chaining) and CTR (Counter Technical Requirement) are supported simultaneously. All standards of the AES can be encrypted and decrypted. The byte replacement and the key expansion are carried out by using a look-up table optimization algorithm. A column mixed optimization structure is provided. Device resources are saved while the operation speed is ensured. An RAM (Random-Access Memory) can be configured as a cache of information and a key through double ports of the FPGA. A problem for storing a time sequence and data of other devices or equipment and the FPGA is resolved. Safe and reliable communication with an FPGA interface joins CRC (Cyclic Redundancy Check) error detection in a manner of a memory bus. The AES encryption chip has the advantages of high safety, high encryption and decryption speeds, low device resource requirement, low cost and the like. The AES encryption chip can be widely used in information technology industries of intelligent card systems, ATMs (Automatic Teller Machines), wireless local area networks, wireless sensor networks and the like.
Owner:BEIHANG UNIV

Data encryption transmission method and system

The invention is applicable to the field of network communication, and provides a data encryption transmission method and system. The data encryption transmission method comprises the following steps: A. a server dynamically generates a DES (data encryption standard) key based on a data encryption algorithm (DEA), and encrypts the DES key by an RSA (Rivest, Shamir and Adleman) public key which is dynamically generated by a client side so as to generate an RSA encrypted ciphertext; B. the client side decrypts the received RSA encrypted ciphertext so as to obtain the DES key; and C. a message transferred between the server and the client side is compressed according to a ZLIB algorithm, and then the DES key encrypts the compressed message. The data encryption transmission method has the beneficial effects that the RSA and DES encryption algorithms are combined together, namely the message is encrypted according to the DES algorithm and meanwhile the DES key is encrypted according to the RSA algorithm so as to integrate the advantage of fast encryption and decryption speed of the DES algorithm and the advantage of high safety of the RSA algorithm; and meanwhile the message is compressed according to the ZLIB algorithm so as to realize safe and efficient data encryption transmission.
Owner:SHENZHEN SEG SCI NAVIGATIONS CO LTD

Method for hierarchichal onion rings routing

The invention discloses a method for hierarchichal onion rings routing. The nodes in a wireless Mesh network are divided into a gateway G, trusted nodes OP (Onion Proxy) and normal nodes Fi, wherein, the trusted nodes OP and the gateway G are induction nodes; the trusted nodes OP serve the function of selecting a route during the initialization of the ring; and the assembly of all the trusted nodes OP and the gateway G constitutes an anonymous assembly. The onion routing of the network is divided into two loop layers, wherein, the first route layer is a loop route consisting of the non-adjacent trusted nodes OP and the gateway G of the anonymous assembly; and the second route layer is a loop route formed by filling normal nodes Fi among the trusted nodes OP, and the second route layer is randomly selected by the trusted nodes OP and the gateway during the initialization. Accordingly, the anonymous and secure communication in the Mesh network can be achieved by the layered loops of the onion rings route. By using the layered onion rings communication protocol and allowing the trusted nodes OP and the gateway of the anonymous assembly to select the route together, the invention can effectively mix up the paths and prevent the intersection attacks, thereby reducing the computation, alleviating the load of the gateway, accelerating the ring construction, preferably utilizing the network resources to reduce delay.
Owner:XIDIAN UNIV

Safe data sharing method suitable for hybrid cloud environment

A safe data sharing method suitable for a hybrid cloud environment is disclosed and comprises the following steps: a system is initialized; a secret key is generated by an authorization mechanism, a data owner encrypts a file so as to generate a data ciphertext and a middle ciphertext of a secret key ciphertext, the data ciphertext is directly uploaded to a public cloud without being processed via a private cloud, the middle ciphertext of the secret key ciphertext is uploaded to the private cloud, the private cloud processes the middle ciphertext and generates the same into a complete secret key ciphertext, ciphertext conversion is conducted via the private cloud, and user data of a mobile terminal is decrypted. According to the method, in the hybrid cloud environment, data is ciphered and shared based on ciphertext strategy attributes; with limited computation and storage capability of the mobile terminal taken into consideration, the private cloud as a proxy can safely take over part of complex ciphering and deciphering tasks via use of secret key decomposition technologies and secret key negotiation technologies on a precondition that data safety is ensured, a computation burden and storage demand of the mobile terminal can be reduced, and a reliable method is provided for protecting and sharing data of the mobile terminal in a highly efficient and safe manner.
Owner:HANGZHOU YUANTIAO TECH CO LTD

Methods and devices for selectively encrypting and decrypting data

The invention belongs to the technical field of data encryption and decryption and in particular relates to methods and devices for selectively encrypting and decrypting data. The method for encrypting data comprises the following steps: generating true random numbers 0 and 1 strings with predetermined length as random seeds according to the preset method; acquiring data from the random seeds multiple times and cascading the acquired data every time into a random string with length not less than plaintext length; generating a plaintext encryption bit identifying random string according to the random string; selecting more than half plaintext data to be encrypted according to the plaintext encryption bit identifying random string; and arranging the encrypted data and the unencrypted data according to the plaintext position to form ciphertext. The device for encrypting data comprises a true random number generating module, an encryption bit identifying random string generating module, a plaintext data selecting and encrypting module and a ciphertext forming module. The invention also provides the method and device for selectively decrypting data. The method and device in the invention reduce the quantity of the encrypted or decrypted data, thus improving the performances of data encryption and decryption.
Owner:BIGKNOW (BEIJING) DATA TECH CO LTD

A mobile terminal file encryption and decryption system and method based on a hardware encryption TF card

The invention provides a mobile terminal file encryption and decryption system and method based on a hardware encryption TF card, which relate to the technical field of information security. The fileencryption and decryption method is applied to a file encryption and decryption system. The system comprises: an operating system bottom support framework for a hardware encrypted TF card, a hardwareencrypted TF card monitoring system service, an application layer registration, and a hardware encrypted TF card system. The method comprises: the hardware encryption TF card is configured to encryptthe device according to the device DevID of the mobile terminal, the IMEI of the SIM card, the SN of the memory chip and the SN of the hardware encrypted TF card are used as parameters, and the true random number generated in the hardware encrypted TF card is used as a key to carry out AES encryption to generate a hardware encrypted TF card root key, which is a key bound with the mobile device andis responsible for encrypting and decrypting the file header information of the mobile terminal. The file encryption and decryption method and system provided by the embodiment of the invention effectively guarantee the information security, and ensure that user data and privacy are not disclosed.
Owner:江苏北弓智能科技有限公司

Method and apparatus for encrypting information, computer device, and storage medium

InactiveCN107666479ASafe and reliable cloud transmissionSafe and reliable storageTransmissionCiphertextDocumentation
The invention relates to a method for encrypting information. The method comprises the following steps that: when an application program in a mobile terminal is monitored to be switched in an on state, a secret key character string is generated randomly and the generated secret key character string is stored; when the application program sends a communication request to a server for the first time, the generated secret key character string is encrypted asymmetrically by using a server public key published by the server in advance and the encrypted secret key character string is sent to the server; a document uploading request triggered by a user in the application program interface is obtained; a document carried by the document uploading request is analyzed, a privacy field in the document is localized, and the privacy filed is encrypted symmetrically by using a secret key character string generated randomly to generate a document ciphertext; and the generated document ciphertext is uploaded to the server, so that the server decrypts the uploaded document ciphertext based on the received encrypted secret key character string and a server private key. With the method provided by the invention, the information decryption and encryption processing efficiency is increased and the safety is enhanced.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

System for controlling ink quantity reset of ink box and ink quantity reset method

The invention provides a system for controlling ink quantity reset of an ink box and an ink quantity reset method. The ink box comprises a control module with a built-in storage unit and a communication module with a built-in storage unit; a printer performs read-write operation on the communication module, and stores ink box identification information and ink quantity information in the storage unit of the communication module; and the communication module comprises a data encryption/decryption module, and encrypts/decrypts the data exchanged by the printer and the communication module. In the ink quantity reset method, the control module determines whether to reset according to the identification bit; when the reset is needed, the control module acquires a bus control right, blocks the communication between the printer and the communication module through a resistor, and resets the data of bytes of the ink quantity of the corresponding ink box in the communication module; and when the printer rereads the ink box information, because the data of the ink quantity of the corresponding ink box are reset, personal computer (PC) monitoring software displays that the ink quantity of the corresponding ink box is already fully filled. The method improves the use efficiency of printer consumables, and reduces the environmental pollution.
Owner:CRM ICBG (WUXI) CO LTD

Multivariable public key encryption method

The invention discloses a multivariable public key encryption method. According to the multivariable public key encryption method, when a key is generated, a matrix is constructed according to an iterative method, the length of the key is greatly reduced, and the key can be managed conveniently; a probability encryption method is adopted, random parameters are introduced into encryption, the random parameters must be solved by a deciphering party through a deciphering process, the random parameters take part in decryption of a plaintext, the plaintext can be deciphered only under the condition that the random parameters are known, the difficulty of ciphertext decryption by an attacker is increased, ciphertexts are different even if public keys are the same, the public keys can be released in the forms such as telephone numbers, and encryption security is improved; based on the combinatorial optimization difficulty and multivariable quadratic polynomial, attack of a quantum computer can be resisted, both the encryption speed and the decryption speed are high, and the method can be applied to mobile terminals such as mobile phones; based on calculation on a finite field, the calculation process is simplified; the addition homomorphism and the subtraction homomorphism are achieved, the multiplication homomorphism can be achieved under special conditions, and the method can be applied to the newly-developed fields such as cloud computing.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and device for encrypting data in ATA memory device with USB interface

The invention relates to a method and a device for encrypting data in an ATA memory device with a USB interface. Based on the conventional ATA memory device, the device for encrypting data consisting of a user card and a hardware encryption board card encrypts data transmitted between the memory device and a USB host, thereby achieving the aim for encrypting the data in the memory device. The device for encrypting data consists of a user secret key card and a hardware encryption bard card; and the hardware encryption bard card consist of a USB transreceiver, a USB equipment controller, a control endpoint buffer area, a batch endpoint buffer area, a main controller, an encryption-decryption module, an ATA controller, a secret key acquisition module and a safe access module. The invention has the advantages that the secret key is directly read by the encryption device, without using a computer connected with the memory, thereby ensuring high security; in addition, the data can be encrypted and decrypted at high speed without using an operation system; and moreover, the secret key is stored in a special hardware secret key memory card, and the secret key and the protected data are independently stored, thereby ensuring the security of the data.
Owner:NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products