Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

38results about How to "Guaranteed transmission security" patented technology

Multi-database data access method and system and proxy server

The invention relates to the field of information technologies and communication, and discloses a multi-database data access method and system and a proxy server. The multi-database data access method disclosed by the invention comprises the following steps that: access requests to various domain names are divided into a read operation type and a write operation type in advance; the proxy server, which is in the same position area with a client side initiating a domain name access request, detects the operation type of the domain name access request according to the domain name access request of the client side; if the operation type of the domain name access request is the read operation type, the proxy server responds to the domain name access request of the client side through read operation of a local database in the same position area; if the operation type of the domain name access request is the write operation type, the proxy server responds to the domain name access request of the client side through read and write operation of a master database; and data in the master database is regularly synchronized to a slave database in the position area, where various proxy servers are. Compared with the prior art, the read-only operation response speed of the databases is ensured; and furthermore, the database synchronization robustness is ensured.
Owner:LETV HLDG BEIJING CO LTD +1

Monitoring video encryption transmission method, device, equipment and medium

The embodiment of the invention provides a monitoring video encryption transmission method and device, electronic equipment and a storage medium, and is applied to a monitoring access server in the articulated naturality web, and the method comprises the steps: responding to a monitoring check request transmitted by an articulated naturality web terminal in the articulated naturality web, callinga plurality of video data packets acquired by monitoring equipment corresponding to the monitoring check request from the Internet; generating encryption keys respectively corresponding to the plurality of video data packets according to the plurality of video data packets; encrypting the plurality of video data packets by adopting encryption keys respectively corresponding to the plurality of video data packets to obtain a plurality of encrypted video data packets; and respectively sending the plurality of encrypted video data packets and each encryption key to the articulated naturality webterminal through mutually independent data transmission channels, so that the articulated naturality web terminal respectively decrypts the plurality of encrypted video data packets by adopting the corresponding encryption keys. By adopting the technical scheme of the invention, the security of calling the monitoring video from the Internet can be improved.
Owner:VISIONVERA INFORMATION TECH CO LTD

Encryption transmission method for Internet of Things security based on quantum random numbers

The invention relates to the technical field of Internet of Things transmission, in particular to an encryption transmission method for Internet of Things security based on a quantum random number, which comprises the following steps of: 1, a random number generated by a quantum true random number generator is taken as a cipher book, and the same identification code for the cipher book is stored at a hardware end and a server end; 2, after receiving the verification request, the server obtains two groups of cipher book subscript random number sequences from the quantum true random number generator; step 3, the hardware end replces the two groups of cipher book subscript random number sequences with an encryption key and a serial number query key according to the array subscript of the cipher book; 4, when the data is sent, the sending end encrypts the transmission data channel; the receiving end decrypts the received data; and 5, if the transmission sequence number does not correspondto the server, the transmission sequence number is re-acquired through the sequence number query key. According to the encryption transmission method for the Internet of Things security based on the quantum random number, the transmission security of the Internet of Things can be ensured, the performance requirement on an MCU is reduced, and the power consumption requirement is reduced.
Owner:浙江神州量子通信技术有限公司

Lightweight certificateless industrial Internet of Things access control method and system

The invention discloses a lightweight certificateless industrial Internet of Things access control method and system. According to the method, a local central server responsible for authorization carries out identity authentication on two parties according to an OAuth thought; different from ACE-OAuth, traditional (such as certificate-based) communication key negotiation needs to be carried out before authentication. According to the method, a local server is used as a trusted third party; two-way authentication between a user and a resource server is realized by using challenge response basedon a public key, a token and a password; communication key negotiation is integrated into an authentication process; the resource server does not need to distribute, receive and verify certificates while the security is ensured; the number of interactive rounds in the authentication process can be effectively reduced, then the communication data transmission amount and the key negotiation calculation consumption including CPU occupation, disk occupation, memory occupation and the like are effectively reduced, and the method is more dominant in safety and practicability and is more suitable for resource-limited environments such as the industrial Internet of Things.
Owner:HANGZHOU DIANZI UNIV

User-defined encryption information transmission method and system

The invention discloses a user-defined encrypted information transmission method and system. The method comprises the following steps: obtaining a first user login permission through a total login platform; judging whether the first user login permission meets a first predetermined requirement or not; if yes, obtaining first user authentication information according to the first user login permission; obtaining a preset authentication verification rule; when the first user authentication information meets a preset authentication verification rule, obtaining a first user setting permission; obtaining a first encryption algorithm according to the first user setting permission, wherein the first encryption algorithm meets a preset authentication verification rule; encrypting the first user setting permission and the first user authentication information through a first encryption algorithm to obtain first encrypted data information; and according to the first encrypted data information and the first user setting permission, obtaining a first execution instruction for sending the first encrypted data information to each subsystem. The technical problems that multiple systems are needed for business handling of financial enterprises, operation is complex, and safety problems exist if login passwords are unified are solved.
Owner:SHANGHAI HANDPAL INFORMATION TECH SERVICE

Method for acquiring node trust value based on detection route in energy harvesting wireless sensor network to avoid black hole node attack

The invention discloses a method for acquiring a node trust value based on a detection route in an energy harvesting wireless sensor network to avoid black hole node attack. In the energy harvesting wireless sensor network, the energy of the nodes, in addition to meeting the data routing energy required for transmitting data packets among the nodes, remains. According to the method, the residual energy of the nodes can be fully utilized, and the detection route is established among the nodes in the network. Establishment of the detection route comprises sending a detection packet and receiving a feedback packet, and because a black hole node cannot correctly distinguish a data packet and the detection packet, malicious packet loss behaviors occur in the transmission process of the detection route, and position information of the detection route is exposed. According to the position information of the black hole node acquired by the detection route, the credibility of the malicious node is reduced, so that the node with higher credibility is selected to transmit the data packet in the transmission process of the next-hop data route. Through calculation of the node trust value, black hole nodes can be effectively avoided, and the data routing success rate of the network is improved. The residual energy of the nodes is fully utilized, and the energy utilization rate of the network is improved.
Owner:CENT SOUTH UNIV

Unmanned aerial vehicle relay Internet of Vehicles secure transmission method based on non-orthogonal multiple access

The invention discloses a unmanned aerial vehicle relay Internet of Vehicles secure transmission method based on non-orthogonal multiple access. The method comprises the following steps of: firstly, constructing a unmanned aerial vehicle relay Internet of Vehicles model based on non-orthogonal multiple access and comprising one base station, one unmanned aerial vehicle and V network edge vehicles; constructing a physical layer security model among the base station, the unmanned aerial vehicle and network edge vehicle nodes based on the unmanned aerial vehicle relay Internet of Vehicles model based on non-orthogonal multiple access; then, based on the unmanned aerial vehicle relay Internet of Vehicles model and the physical layer security model, constructing an unmanned aerial vehicle relay Internet of Vehicles secure information transmission target and optimization conditions; and finally, obtaining a solution through a golden section method and a graph theory based on the unmanned aerial vehicle relay Internet of Vehicles information secure transmission target and optimization conditions, and constructing an unmanned aerial vehicle relay Internet of Vehicles information secure transmission method. Compared with an existing mechanism, on the premise that the information transmission security is guaranteed, the total data transmission rate from the base station to the vehicle in the unmanned aerial vehicle relay Internet of vehicles can be increased.
Owner:RES & DEV INST OF NORTHWESTERN POLYTECHNICAL UNIV IN SHENZHEN +1

A lightweight certificateless industrial internet of things access control method and system

The invention discloses a lightweight access control method and system for the industrial internet of things without a certificate. According to the idea of ​​OAuth, the local central server responsible for authorization authenticates both parties. Unlike ACE‑OAuth, which requires traditional (such as certificate-based) communication key negotiation before authentication, this method uses the local server as a trusted first Three parties, use public key-based challenge responses, tokens and passwords to realize two-way authentication between users and resource servers, and integrate communication key negotiation into the authentication process, while ensuring security, resource servers do not need to distribute and receive certificates and verification, which can effectively reduce the number of interactive rounds in the authentication process, thereby effectively reducing the amount of communication data transmission and key negotiation calculation consumption, including CPU occupation, disk occupation, memory occupation, etc., which is more advantageous in terms of security and practicability , more suitable for resource-constrained environments such as the Industrial Internet of Things.
Owner:HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products