Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31results about How to "Guaranteed security strength" patented technology

Communication method and system based on quantum Ukey

The invention discloses a communication method and system based on the quantum Ukey, aiming to solve the potential safety hazards that the algorithm is not safe, the user password strength is not highenough, the user password plaintext input, secret key distribution and management are difficult, and the secret key cannot be automatically updated in the aspects of current identity authentication and security access cloud service application. The communication method based on the quantum Ukey comprises the following steps that when an access application service instruction is acquired, a user terminal determines a first quantum key by the quantum Ukey established the connection relation, and sending the corresponding authentication message to an authentication management platform for identity authentication; the authentication management platform obtains a second quantum key from the KMS according to the authentication message, and decrypting the encrypted information in the authentication message, if the decrypted information is consistent with the plaintext information in the authentication message, the identity authentication is determined to pass, and the passing information isreturned to the user terminal, so that the user terminal accesses the application server through the first quantum key.
Owner:QUANTUMCTEK GUANGDONG CO LTD

Key management method for integrated avionic system

The invention relates to a key management method for an integrated avionic system. The key management functions in the entire process from the generation to final destruction of a key and is realized as a functional component for the safety management (GSM-SM) of system management in an integrated modular avionic (IMC) system to perform unified management on all keys in the system; and the key management mainly comprises the following steps of: 1) generating the keys; 2) loading the keys; 3) distributing the keys; and 4) using the keys. The method is favorable for improving the active defense level of airborne embedded systems of China, constructing and perfecting a safety guarantee system of the integrated avionic system, defending an equipment system against foreign threats and improving the destruction resistance of the aviation equipment system.
Owner:AVIC NO 631 RES INST

Method for encoding and identifying thick oil environment working device and management system

The invention relates to a thick oil environment working device with a logo and a manufacturing method of the logo on the thick oil environment working device. The manufacturing method includes the step of recording a rectangular-ambulatory-plane shaped positioning icon and a long strip icon on the working device. Furthermore, the invention discloses a method and a device for identifying the logo. The method for identifying the logo includes the step: performing multi-information synchronization and identification on a code by using a two-dimensional searching and matching recognition algorithm, and realizing the digital management of the working device. Besides, the invention discloses an identity identification management system of an oil tube. According to the method for encoding and identifying the thick oil environment working device and the management system, the rectangular-ambulatory-plane shaped icon is convenient to position and identify, and also easy to record; the long strip icon is easy to record, clean and identify, and matched up with the principle of binary code; the recognition algorithm of the invention takes the two-dimensional searching and matching as the principle; by sampling a specific sampling point, the sampling frequency is reduced, the recognition scale is effectively improved and the integration of the encoding information is added; moreover, the recognition rate is greatly improved.
Owner:胜利油田胜利自动化开发有限责任公司

Sequence cipher realization device and sequence cipher realization method thereof

The invention relates to a sequence cipher realization device and a sequence cipher realization method thereof. The method comprises the following steps: firstly, generating a sequence source by adopting Galois-structure nonlinear feedback shift registers designed based on mixing and diffusion parts as a sequence source drive; and then, after the registers load keys, initialization vectors and constant parameters completely, carrying out idle operation for a certain number of beats, carrying out nonlinear operation on an output of the diffusion unit so that the output is taken as a key stream sequence, and carrying out exclusive or operation on the key stream sequence together with a plaintext sequence to form a ciphertext. According to the sequence cipher realization device and the sequence cipher realization method thereof disclosed by the invention, relatively less operation and hardware cost can be used; through combined use of the mixing unit and the diffusion unit, after multiple times of iterations, a pseudorandom sequence is output; according to hardware resource and speed requirements, the deployment and the implementation are flexible; and the requirements of communication for diverse networks and devices are met.
Owner:THE PLA INFORMATION ENG UNIV

Method for establishing 6LoWPAN (6 Local Wireless Personal Area Network) key

The invention provides a method for establishing a 6LoWPAN (6 Local Wireless Personal Area Network) key. The method comprises the following steps of: step 1, after receiving a first DIO (Direct Input / Output) message from a router node Ru, an internal router node Rx sends a message request to the node Ru to obtain a group key; step 2, after receiving the message, Ru calculates f(k) and f(k+delta1) according to a k value in the message; step 3, Ru decrypts {f(k+delta 1) / / KI}f(k) information by using f(k) and then compares the decrypted f(k+delta1) with a value calculated by Ru, if the decrypted f(k+delta 1) is equal to the calculated value, Rx passes through authentication of Ru; otherwise Rx does not pass through authentication; step 4, if Rx passes through the authentication, Ru saves KI as the key between Ru and Rx and sends a response message to Rx; step 5, after receiving the response message, Rx decrypts the whole message through KI to obtain an interface identifier IIu of Ru and then compares the interface identifier IIu with an interface identifier in a data package source address to authenticate Ru; and step 6, if Ru passes through authentication, Rx obtains the group key KG and takes Ru as a pair key KI between a father node and a storage of Rx. In the method for establishing a key, Hash is used repeatedly, therefore calculation amount is small.
Owner:SHANGHAI YINGLIAN SOMATOSENSORY INTELLIGENT TECH CO LTD

Equipment registration, authentication and data transmission method and device

ActiveCN112804678APrevent or enable core functionsEasy accessSecurity arrangementComputer hardwareData transmission
The embodiment of the invention provides an equipment registration method and device, an equipment authentication method and device, an equipment data transmission method and device, electronic equipment and a computer readable storage medium. The registration method comprises the following steps: before registration of the equipment, reading a first SRAM value generated by electrification of the equipment, generating registration information according to the first SRAM value, and sending the registration information to a registration server for storage; when the equipment is registered, reading a second SRAM value generated by electrifying the equipment, generating a registration request according to the second SRAM value, and sending the registration request to the registration server, wherein the registration server searches a first SRAM value matched with the second SRAM value from the registration information according to the registration request, and completes the registration process of the equipment. According to the technical scheme, when the equipment is registered, only the SRAM value needs to be read out and registered to the registration server, operations such as certificate burning on the equipment on a production line are not needed, equipment access is facilitated, and the flexibility of equipment authentication access is improved.
Owner:ZHEJIANG KOUBEI NETWORK TECH CO LTD

Coding and identification method and management system for heavy oil environmental work equipment

The invention relates to a thick oil environment working device with a logo and a manufacturing method of the logo on the thick oil environment working device. The manufacturing method includes the step of recording a rectangular-ambulatory-plane shaped positioning icon and a long strip icon on the working device. Furthermore, the invention discloses a method and a device for identifying the logo. The method for identifying the logo includes the step: performing multi-information synchronization and identification on a code by using a two-dimensional searching and matching recognition algorithm, and realizing the digital management of the working device. Besides, the invention discloses an identity identification management system of an oil tube. According to the method for encoding and identifying the thick oil environment working device and the management system, the rectangular-ambulatory-plane shaped icon is convenient to position and identify, and also easy to record; the long strip icon is easy to record, clean and identify, and matched up with the principle of binary code; the recognition algorithm of the invention takes the two-dimensional searching and matching as the principle; by sampling a specific sampling point, the sampling frequency is reduced, the recognition scale is effectively improved and the integration of the encoding information is added; moreover, the recognition rate is greatly improved.
Owner:胜利油田胜利自动化开发有限责任公司

Data security system and method suitable for sharing encrypted files and recovering keys

The invention relates to a data security system applicable to sharing an encrypted file and recovering a secrete key and a method thereof, which are used for converting a source file into the encrypted file, wherein an administrator secrete key and a user secrete key are input through an input unit; a random secrete key is generated through a processing unit with a random derivation function according to the administrator secrete key; and a secrete key storage area is provided for storing the random secrete key and the user secrete key, which are encrypted and protected through the administrator secrete key. In the encryption process, an encryption module randomly generates a session secrete key so that the content of the source file is encrypted into encrypted data; the session secrete key is encrypted through the administrator secrete key or the user secrete key so that an encrypted session secrete key is generated; and the encrypted session secrete key and the encrypted data are packed into the encrypted file. Thereby, the encrypted file only has one encrypted session secrete key so that the safety strength of the encrypted file can be ensured. In the decryption process, the administration secrete key can be used by an administrator to decrypt the secrete key storage area, and consequently the random secrete key and the user secrete key are taken out to decrypt the encrypted file.
Owner:EGIS TECH

Error sampling method for lattice public key password

The invention discloses an error sampling method for a lattice public key password. The error sampling method comprises the following steps: step 1, receiving input parameters k1 and k2, and operatinga k1-time binomial distribution sampling module and a k2-time integer uniform sampling module for representing a result of a sampling algorithm; step 2, outputting an integer a conforming to binary distribution through a random number generated by an input 2-bit random source by using a binary distribution sampling module; step 3, repeating the binomial distribution sampling module k1 times, andcalculating the output sum A of the binomial distribution sampling module k1 times; step 4, an integer uniform sampling module is used; outputting a structure B conforming to integer uniform samplingfor k2 times through a random number generated by an input bit random source (shown in the specification); and outputting the structure B conforming to the integer uniform sampling for k2 times through the random number generated by the input bit random source, and step 5, outputting a sampling result S = A + B mod q. According to the method, two different sampling algorithms are combined with each other, when the parameters k1 and k2 are selected properly, the good balance between the efficiency and the safety can be achieved, and meanwhile the flexibility is high.
Owner:TSINGHUA UNIV

Lightweight text encryption method based on improved Feistel structure

The invention discloses a text lightweight encryption method based on an improved Feistel structure, and belongs to the technical field of information security. Due to the fact that a traditional encryption method needs a large amount of resource allocation, the encryption and decryption speed is low, and the standards of rapidity and real-time performance cannot be met, the text-oriented lightweight grouping encryption and decryption method is designed. The S box with the nonlinearity of 110, the differential approximation probability of 0.0391 and the strict avalanche criterion correlation matrix average value of 0.5066 is generated and optimized by applying two chaotic mappings. According to the method, a generalized Feistel structure is correspondingly improved, so that the improved structure can process all intermediate states at a time, and a text-oriented lightweight grouping encryption and decryption algorithm is formed by combining an optimized S box, a newly designed key expansion algorithm, a P box and the like. The GE number of the algorithm meets the lightweight standard, and the algorithm is tested, analyzed and compared to obtain better results, so that the algorithm is suitable for providing encryption and decryption functions for limited equipment.
Owner:HARBIN INST OF TECH AT WEIHAI

Vehicle front pillar assembly and automobile

The invention discloses a vehicle front column assembly and an automobile. The vehicle front column assembly comprises an upper reinforcing plate, a lower reinforcing plate, an upper hinge plate, a front column supporting plate, a lower hinge plate and a front wall supporting plate, wherein the upper reinforcing plate and the lower reinforcing plate are independently molded and connected with eachother; the upper hinge plate is arranged on the upper reinforcing plate; the front column supporting plate and the lower hinge plate are independently molded and connected with each other; the frontcolumn supporting plate is connected to one side, facing away from the upper reinforcing plate, of the lower reinforcing plate; the lower hinge plate faces away from the lower reinforcing plate; and the front wall supporting plate is connected to the connecting part of the lower hinge plate and the front column supporting plate. The automobile comprises a front wheel cover side sill outer panel and the vehicle front column assembly; and the upper reinforcing plate and the lower reinforcing plate are both connected with the front wheel cover side sill outer panel in a laminated manner. According to the vehicle front column assembly and the automobile, the anti-bending capacity of a front column during high speed frontal collision or biasing collision is improved, the stress is effectively dispersed, the deformation of the front column during high speed frontal collision or biasing collision is reduced, the stability of the front column is kept, and the safety of the whole automobile isenhanced.
Owner:WM MOTOR TECH GRP CO LTD

A communication method and system based on quantum ukey

The invention discloses a communication method and system based on the quantum Ukey, aiming to solve the potential safety hazards that the algorithm is not safe, the user password strength is not highenough, the user password plaintext input, secret key distribution and management are difficult, and the secret key cannot be automatically updated in the aspects of current identity authentication and security access cloud service application. The communication method based on the quantum Ukey comprises the following steps that when an access application service instruction is acquired, a user terminal determines a first quantum key by the quantum Ukey established the connection relation, and sending the corresponding authentication message to an authentication management platform for identity authentication; the authentication management platform obtains a second quantum key from the KMS according to the authentication message, and decrypting the encrypted information in the authentication message, if the decrypted information is consistent with the plaintext information in the authentication message, the identity authentication is determined to pass, and the passing information isreturned to the user terminal, so that the user terminal accesses the application server through the first quantum key.
Owner:QUANTUMCTEK GUANGDONG CO LTD

Plastic tank water treatment equipment

The invention discloses plastic tank water treatment equipment. The equipment comprises a tank body, end sockets are fixedly connected to the two ends of the tank body, reinforcing strips are installed in the end sockets, a plurality of evenly-spaced circular rings are arranged in the tank body and tightly attached to the inner wall, and a plurality of evenly-spaced reinforcing blocks are arranged at the position, located at the periphery of the rings, of the inner wall of the tank body. Circular holes are formed in the reinforcing blocks, the head ends of the circular rings penetrate through the circular holes and then are connected with the tail end into a whole, saddle bases are arranged at the bottom of the tank body, the saddle bases are welded to the two sides of the bottom of the tank body in a two-section split charging manner, and the bottom face, located between the saddle bases, of the tank body is tightly attached to the placing face. Lifting lugs are arranged at the outer side edges of the saddle bases, reinforcing lining plates are arranged at the inner side edges of the saddle bases, the reinforcing lining plates are fixedly connected with the outer side edges of the saddle bases through bolts, the lifting lugs are welded to the reinforcing lining plates, and a ladder stand is arranged on the outer wall of the tank body. According to the equipment, the production efficiency is high, the strength is high, various use occasions are met, and the environment-friendly effect is achieved.
Owner:JIANGSU JINSHAN ENVIRONMENTAL PROTECTION TECH

Device registration, authentication and data transmission method and device

ActiveCN112804678BPrevent or enable core functionsEasy accessSecurity arrangementComputer hardwareEngineering
Embodiments of the present application provide a device registration method and device, a device authentication method and device, a device data transmission method and device, electronic devices, and computer-readable storage media. The registration method includes: before the registration of the device, reading the first SRAM value generated by powering on the device, and generating registration information according to the first SRAM value and sending it to the registration server for storage; when the device is registered, reading the first SRAM value of the device The second SRAM value generated by powering on the device, generates a registration request based on the second SRAM value and sends it to the registration server; wherein, the registration server searches the registration information for the first SRAM value that matches the second SRAM value according to the registration request, and completes this Device registration process; this technical solution only needs to read the SRAM value and register it to the registration server when the device is registered, and does not need to perform operations such as burning certificates on the device on the production line, which is convenient for device access and improves device authentication. Access flexibility.
Owner:ZHEJIANG KOUBEI NETWORK TECH CO LTD

Wood-plastic window frame section bar forming mould

The invention relates to a wood-plastic window frame section bar forming mould. The wood-plastic window frame section bar forming mould is sequentially connected to a neck mould a, a neck mould b, a neck mould c, a confluence board, a bracket board a, a bracket board b, a transition board, a mould body as well as a core rod from top to bottom through bolts, wherein a mould cavity formed by the neck mould a, the neck mould b and the neck mould c comprises a window frame opening cavity A and a window frame opening cavity B which are arranged left and right and are rectangular, the window frame opening cavity A is higher than the window frame opening cavity B; the opening part of the window frame opening cavity A and the opening part of the window frame opening cavity B are arranged upwards;the two sides of the opening part of each of the window frame opening cavity A and the window frame opening cavity B are inwards provided with short convex ribs, and the outer side of the window frameopening cavity A is further provided with a long convex rib; a plurality of soundproof cavities are arranged below the window frame opening cavity A and the window frame opening cavity B, and a plurality of reinforcing rib plates are arranged among the soundproof cavities; and the bottoms of the soundproof cavities are provided with a mounting long rib plate. The wood-plastic window frame sectionbar forming mould is simple and practical in structural design, is good in use effect, can guarantee safety strength while achieving the good soundproof effect, and also has a very high practical usevalue.
Owner:HUANGSHI HONGDI PLASTIC MOLD

Small vascular bypass intra-operative auxiliary stoma forming device

The invention provides a small vascular bypass intra-operative auxiliary stoma forming device. The traditional medical technologies for carrying out vascular end-to-side anastomosis by the aid of noninvasive sutures under microscopes are the most classic revascularization surgical technologies, but stomas are difficult to directly visualize along with diminishing of the diameters of blood vesselseven under the high-power microscopes, and the problems of vulnerability to missing suturing or mistaken suturing of vascular walls on opposite sides, blood leakage or blockage of stomas, multiplyingof difficulty of anastomosis technologies and great restriction on universal application of the anastomosis technologies can occur. The vascular bypass intra-operative auxiliary stoma forming device has the advantages that the vascular bypass intra-operative auxiliary stoma forming device is applied to small vascular bypass, two layers of vascular walls of blood vessels of a receptor can be separated from each other on the premise that damage on inner membranes of the blood vessels is not increased, the intra-operative microscopic visualization degrees can be upgraded, the purposes of optimizing suture programs, increasing the anastomosis speeds and shortening the operation time can be achieved, accordingly, the operating difficulty can be lowered, and the postoperative complication incidence rate can be reduced.
Owner:王刚

Serial cipher realization device and its serial cipher realization method

The invention relates to a sequence cipher realization device and a sequence cipher realization method thereof. The method comprises the following steps: firstly, generating a sequence source by adopting Galois-structure nonlinear feedback shift registers designed based on mixing and diffusion parts as a sequence source drive; and then, after the registers load keys, initialization vectors and constant parameters completely, carrying out idle operation for a certain number of beats, carrying out nonlinear operation on an output of the diffusion unit so that the output is taken as a key stream sequence, and carrying out exclusive or operation on the key stream sequence together with a plaintext sequence to form a ciphertext. According to the sequence cipher realization device and the sequence cipher realization method thereof disclosed by the invention, relatively less operation and hardware cost can be used; through combined use of the mixing unit and the diffusion unit, after multiple times of iterations, a pseudorandom sequence is output; according to hardware resource and speed requirements, the deployment and the implementation are flexible; and the requirements of communication for diverse networks and devices are met.
Owner:THE PLA INFORMATION ENG UNIV

Data security system applicable to sharing encrypted file and restoring secrete key and method thereof

The invention relates to a data security system applicable to sharing an encrypted file and recovering a secrete key and a method thereof, which are used for converting a source file into the encrypted file, wherein an administrator secrete key and a user secrete key are input through an input unit; a random secrete key is generated through a processing unit with a random derivation function according to the administrator secrete key; and a secrete key storage area is provided for storing the random secrete key and the user secrete key, which are encrypted and protected through the administrator secrete key. In the encryption process, an encryption module randomly generates a session secrete key so that the content of the source file is encrypted into encrypted data; the session secrete key is encrypted through the administrator secrete key or the user secrete key so that an encrypted session secrete key is generated; and the encrypted session secrete key and the encrypted data are packed into the encrypted file. Thereby, the encrypted file only has one encrypted session secrete key so that the safety strength of the encrypted file can be ensured. In the decryption process, the administration secrete key can be used by an administrator to decrypt the secrete key storage area, and consequently the random secrete key and the user secrete key are taken out to decrypt the encrypted file.
Owner:EGIS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products