Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

246results about How to "Guaranteed safe transmission" patented technology

Identity authentication method and system

The embodiment of the invention discloses an identity authentication method and system, and the method comprises the steps that a terminal randomly generates a signature secret key pair comprising a signature public key and a signature secret key; the terminal uses the signature public key to apply for a digital certificate and an encryption secret key pair from a server; the terminal carries out the signature of a first interaction message in a process of building communication with opposite terminal equipment through the signature secret key, and enables the first interaction message after signature to be transmitted to the opposite terminal equipment; the terminal carries out the signature of the digital certificate of the terminal equipment through the server if the terminal receives a second interaction message sent by the opposite terminal equipment; and the terminal confirms the valid identity of the opposite terminal equipment if the signature verification is passed. According to the embodiment of the invention, the method can carry out the verification of the validity of the identities of two communication sides of intelligent terminals through the valid generation and transmission of the digital certificate and the combination with the server to complete the signature and signature verification processes, and guarantees the safe transmission of communication contents.
Owner:SHENZHEN TRANSSION HLDG CO LTD

Cloud resource access control method based on dynamic cross-domain security token

The invention discloses a cloud resource access control method based on a dynamic cross-domain security token. The method includes that 1) an access agent is preset on a cloud resource service providing party and requests a dynamic security token for each dynamic temporary user to the cloud resource providing party; 2) the cloud resource providing party generates the dynamic security token, sets the access strategy and transmits the strategy to the dynamic temporary users; 3) a sharing secrete key is respectively set between each dynamic temporary user and the cloud resource providing party; 4) the dynamic temporary users conduct signing on the access request through the sharing secrete key and transmit the authentication request news to the cloud resource providing party; and 5) the cloud resource providing party conducts signing on the authentication request news through the sharing secrete key, authentication passes if signatures are identical, the access strategy of the dynamic security token and the access agent is judged, and the access request of the dynamic temporary users is responded according to judgment results. The method achieves the high-efficiency cross-domain authentication mechanism and is high in judgment efficiency.
Owner:INST OF INFORMATION ENG CAS

Image encryption method based on block scrambling and state conversion

The invention provides an image encryption method based on block scrambling and state conversion, and the method comprises the steps: carrying out the processing of an image matrix through a secret key generation system, generating an initial iteration parameter, inputting the initial iteration parameter into a four-wing 4D chaotic system, and carrying out the iteration to generate four chaotic sequences; intercepting the chaotic sequence and performing descending sort to obtain row and column scrambling vectors to generate a scrambling matrix; scrambling the scrambling matrix by using a scanning curve; scrambling the image matrix by using the scrambled matrix to obtain a pixel scrambling matrix, and performing DNA encoding and chaotic sequence input on the pixel scrambling matrix to determine a finite state automaton to obtain a state conversion sequence; performing DNA decoding on the state conversion sequence to obtain a state conversion sequence; and diffusing the state transitionsequence E by using the chaotic sequence to obtain an encrypted image. The scrambling method can effectively break the correlation of adjacent pixels, can resist various attacks, is high in safety, ensures safe transmission of images, and is very suitable for image encryption.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Access control system and method supporting cross-domain data sharing and wireless communication system

The invention belongs to the technical field of wireless communication networks, and discloses an access control system and method supporting cross-domain data sharing, and a wireless communication system. Users needing to share data in a domain A select elliptic curve parameters to generate ECC key pairs; a global authentication center CA of the domain B generates a global public parameter; the proxy node in the domain B encrypts the system public key and the attribute set by using the ECC public key of the domain A user; the domain A user decrypts the data from the domain B by using the ECCprivate key of the domain A user and uploads the data to the public cloud; the legal user sends a file access request to the public cloud; and when user revocation occurs, the proxy server searches acorresponding attribute private key list according to the global identifier of the user and deletes the attribute private key list. The method is high in safety under the condition of the same secretkey length. The method gives full play to the characteristic of strong computing power of agent nodes, completes the preprocessing of some data, helps a user to carry out partial decryption, and improves the decryption efficiency of the user.
Owner:XIDIAN UNIV

Terminal equipment for realizing content protection and transmission method thereof

The invention discloses terminal equipment for realizing content protection, which receives first authentication information, first right information and content data from the network side or other terminal devices. An authentication information processor generates second authentication information of the terminal equipment and calculates the first authentication information and the second authentication information to obtain a first shared session key; a right information processor uses the first shared session key to decrypt first right information; a content processor uses the first shared session key for decryption to obtain content data and uses the content data according to the right information; and during transmitting data, the authentication information processor determines the legality of opposite equipment and obtains a second shared session key; and the right information processor generates second right information, encrypts the second right information and the content data by using the second shared session key and transmits the encrypted second right information and the encrypted content data. The invention also discloses a transmission method for realizing content protection. By applying the terminal equipment and the transmission method, the protection and the transmission of the content of a family digital network can be realized.
Owner:UNITEND TECH +1

A resource optimization method for safe calculation unloading in mobile edge computing network

The invention discloses a resource optimization method for safe calculation unloading in a mobile edge computing network, which comprises the following steps: S1, initializing parameters and configurations of a user and a mobile edge server; S2, obtaining an initial communication and computing resource allocation scheme and a corresponding initial objective function value; S3, according to that initial communication and computing resource allocation scheme, a projection gradient method is adopted to obtain a new communication and computing resource allocation scheme and correspond new objective function values; S4, judging whether that difference between the new objective function value and the last objective function value is within the threshold value range, and if so, outputting a current communication and calculation resource allocation scheme and terminating optimization; Otherwise proceeding to step S5; S5, taking the current communication and computing resource allocation schemeas the initial communication and computing resource allocation scheme, and returning to step S3. The method considers the scene of eavesdropper in the system, improves the security of the system, realizes the minimum delay, and improves the service quality.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

NOMA mobile edge computing system construction method with anti-eavesdropping capability

The invention discloses an NOMA mobile edge computing system construction method with anti-eavesdropping capability. In the case that there is an eavesdropper and the channel state information of theeavesdropper is unknown, a user introduces a metric independent of the channel state information of the eavesdropper through secret coding to quantify the anti-eavesdropping ability of the user. Two users simultaneously send respective partial tasks to nearby access points equipped with mobile edge computing servers through NOMA uplinks in a resource block sharing manner and perform fast processing, thereby actively assisting the execution of computing tasks of mobile users, and ensuring the fast execution of the computing tasks with low delay tolerance and high complexity of mobile clients. The NOMA mobile edge computing system construction method disclosed by the invention has the advantages of ensuring secure transmission of information through the anti-eavesdropping ability when the channel state information of the eavesdropper is unknown. According to the NOMA mobile edge computing system construction method disclosed by the invention, a class of interrupt events based on probabilistic analysis is also defined to measure the communication performance of the system and to evaluate the impact of transmitting power and unloading tasks on the system performance.
Owner:NANJING UNIV OF POSTS & TELECOMM

Magnet valve with pressure limitation for slip-controlled motor vehicle brake systems

PCT No. PCT/DE95/01386 Sec. 371 Date Apr. 28, 1997 Sec. 102(e) Date Apr. 28, 1997 PCT Filed Oct. 10, 1995 PCT Pub. No. WO96/13414 PCT Pub. Date May 9, 1996A magnet valve with low noise upon shutoff from the pressure limiting function. The magnet valve has a two-part valve tappet, whose inner valve tappet part has the closing member of a seat valve. The closing member is circumferentially engaged in spaced-apart fashion, forming a gap space, by a tubular portion of the outer valve tappet part. From the gap space, a pressure fluid conduit leads to a control chamber, which is located between the face end, remote from the seat valve, of a magnet armature that cooperates with the valve tappet, and a valve dome. Upon shutoff of the magnet valve, the seat valve changes from its closing position to a partly open position, in which dynamic pressure in the gap space becomes operative and is transmitted through the pressure fluid conduit into the control chamber. The hydraulic force that is operative there on the magnet armature acts counter to the opening forces of the magnet valve and slows down its opening motion. Because of the thus-throttled flow of pressure fluid through the seat valve, a pressure surge is averted. The magnet valve can be used in slip-controlled motor vehicle brake systems.
Owner:ROBERT BOSCH GMBH

Method of security probability-based power allocation in millimeter wave system

The invention discloses a method of security probability-based power allocation in a millimeter wave system. The method comprises the following steps: S1, an equivalent channel modeling step, whereina millimeter wave channel model is established, and thus a discrete angular domain channel model is obtained; S2, a power allocation strategy defining step, wherein a minimum value of a receiving signal-to-noise ratio of a legal direction is forcibly restricted, an upper boundary of a receiving signal-to-noise ratio of an eavesdropping direction is limited at the same time an allocation strategy of total transmission power is formulated, and an effect that target security probability meets constraints of quality-of-service demand is guaranteed; and S3, a power allocation step, wherein artificial noise beamforming power allocation based on interruption is carried out, and performance evaluation is carried out on a final allocation result. The invention provides the power allocation method with a data protection function, privacy and confidentiality of data in a wireless communication process can be effectively improved, established security probability is achieved, normalized safety throughput is increased, and system complexity is reduced.
Owner:NANJING UNIV OF POSTS & TELECOMM

Picture transmission control system, and security protection and transmission method of each related end

The invention relates to the technical field of picture transmission of an intelligent terminal, and brings forward a tachograph picture transmission control method. The method comprises the following steps: a tachograph obtains an object picture in response to a user snapshot instruction and storing the object picture to a local storage medium; the tachograph automatically uploading the object picture to a mobile terminal through a first channel; at the same time, the mobile terminal automatically uploading the object picture automatically obtained from the first channel to a cloud end through a second channel; and the tachograph, according to a comparison result list which is obtained from the first channel and is fed back by the mobile terminal, deleting an object picture, specified to be stored in the local storage medium, in the comparison result list. The invention also relates to a picture security protection and transmission method and a corresponding terminal. According to the invention, security protection and automatic real-time transfer of picture files are realized, and picture loss generated when pictures are stored at a tachograph end and are covered due to a limited storage capacity is avoided.
Owner:BEIJING QIHOO TECH CO LTD

Unapproved construction information high precision acquisition method based on mobile terminal

The invention discloses an unapproved construction information high precision acquisition method based on a mobile terminal, and relates to the information acquisition technology field. The unapproved construction information high precision acquisition method comprises steps: processing of line data, spatial data displayed in the mobile terminal, and acquisition of unapproved construction information. The unapproved construction information high precision acquisition method is advantageous in that a method of acquiring, integrating, and pushing information for location awareness in different environments is used to effectively support integration of audio and video information, image information, position information, and attribute information by taking place name and address data as a basis, and the multidirectional comprehensive acquisition and collection of the unapproved construction information is realized; during the data acquisition, automatic acquisition is carried out, and range value precision is high, and a range value is precise to a centimeter level, and therefore the high precision position locating and the acquisition of the related data are realized; before the data pushing, the safety of the data is guaranteed by adopting an information encryption pushing strategy based on the position and a mobile terminal data strategy, and therefore safe transmission of a line and red line data during a mobile inspection process is realized, and the currency of the unapproved construction data acquisition is improved.
Owner:星际空间(天津)科技发展有限公司

Secure transmission method based on non-trusted cognitive user collaboration interference

The invention discloses a secure transmission method based on non-trusted cognitive user collaboration interference, which belongs to the technical field of wireless communication. The secure transmission method adopts a time-division scheme, and is divided into two phases. The two phases respectively correspond to first hop transmission and second hop transmission of an authorized user. At each transmission phase, the authorized user occupies part of time slots for transmitting authorization information and selecting one cognitive user to generate interference information for assisting his secure transmission; and the rest of the time slots at the phase is allocated to the cognitive user for use. According to the secure transmission method based on non-trusted cognitive user collaboration interference, two cooperative cognitive users are selected optimally, and transmission time slots are allocated to the users for maximizing transmission speed of the cognitive users while ensuring security of the authorized user; and the simulation results indicate that the secure transmission method can improve secure outage performance of the authorized user and average transmission speed of the cognitive user when compared with the traditional single cognitive user collaborative scheme.
Owner:XI AN JIAOTONG UNIV

Constellation rotation assisted wireless physical layer secure transmission method in two-way relay system

The invention discloses a constellation rotation assisted wireless physical layer secure transmission method in a two-way relay system. The constellation rotation assisted wireless physical layer secure transmission method comprises: 1) channel information is established, a user node A and a user node B select symbols carrying information from a rotated constellation, inject manual noise to construct a composite signal, carry out phase pre-compensation on the composite signal according to the estimated channel information to obtain a composite signal SA to be sent by the user node A and a composite signal SB to be sent by the user node B, and meanwhile respectively send the composite signal SA to be sent and the composite signal SB to be sent at transmitting power P; 2) a relay receives the signals sent by the user node A and the user node B to obtain a mixed signal yB; 3) the relay amplifies the obtained mixed signal and broadcasts the mixed signal to the user node A and the user node B; and 4) the user node A and the user node B detect the mixed signal. The constellation rotation assisted wireless physical layer secure transmission method disclosed by the invention can be used for effectively resisting the eavesdropping behavior of incredible relays.
Owner:XI AN JIAOTONG UNIV

Thermal lodging type low-aging-speed cable

The invention discloses a thermal lodging type cable with a low aging speed, and belongs to the fields of cable. According to the thermal lodging type low-aging-speed cable, at a low temperature, opposite heat insulation sheets form a circle of independent heat insulation layer in an outer protection layer so as to effectively avoid external low temperature from being conducted into a wire core layer while a self-lodging rod is not in contact with the surface of the wall-attached heat insulation layer so as to effectively reduce heat exchange inside and outside the cable, so that the cable iseffectively prevented from being frostbitten at a low temperature; at a high temperature, the opposite heat insulation sheets are propped open after being heated, and a double-end embedded heat conduction rod can be communicated with a sheath layer and the wall-attached heat insulation layer so as to continuously dissipate the heat generated by the cable from inside to outside while the self-lodging rod falls down and is attached to the surface of the wall-attached heat insulation layer, so that the heat dissipation performance of the cable is effectively improved; and the heat dissipation andheat insulation performance of the cable can be automatically adjusted at different use temperatures, so that the aging speed is remarkably reduced, the service life is prolonged, and potential safety hazards are reduced.
Owner:湖南湘联电缆有限公司

Software-defined Internet of Things network topology data transmission security management method and system

The invention provides a software-defined Internet of Things network topology data transmission security management method and system, and the method comprises the steps: deploying common nodes and aggregation nodes at Internet of Things network nodes, and enabling the nodes to communicate with each other; performing encryption algorithm configuration on common nodes and aggregation nodes; each adjacent node performing bidirectional identity authentication and key agreement, and each node recording credible nodes passing authentication around itself and suspicious nodes failing to be authenticated; periodically executing topology discovery, collecting topology information of common nodes by the aggregation nodes, forwarding messages of trusted nodes among the aggregation nodes, establishing a trusted path, and constructing a global topology view; sequentially forwarding and aggregating the topology state messages according to the determined trusted path; and determining newly added nodes and malicious nodes based on the global topology view, broadcasting, and updating the network topology structure of the Internet of Things. According to the invention, the security and reliabilityof data transmission can be effectively improved.
Owner:ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products