Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

139results about How to "High encryption strength" patented technology

Mobile phone ciphering method based on safe digital interface ciphering card

The invention discloses a handset encryption method based on a safety digital interface encryption card, which can realize end-to-end encryption data transmission on the basis of unchanging the prior handset hardware facilities through inserting the safety digital interface encryption card in a handset with a safety digital interface slot. The invention is mainly based on three safety main bodies including the safety digital interface encryption card, the handset (2) and a certificate server (3). The connection and communication of the safety digital interface encryption card and the handset are finished in accordance with the mechanical feature, the electrical character and the communication protocol of a safety digital interface (4). After the encryption process of the safety digital interface encryption card, voice, data and the data of messages on one handset are transmitted to the other handset through a mobile communication network, and the encryption of the data is finished by another safety digital interface encryption card. Before the encryption data is transmitted, the certificate server, a handset calling party and a handset called party which are set up need to finish the mutual certificate and secret negotiation together.
Owner:SOUTHEAST UNIV

Motorcade safety management system and method based on ring signature and vehicle management platform

The invention belongs to the technical field of Internet of Vehicles, and discloses a motorcade safety management system and method based on ring signatures, and a vehicle management platform. identity-based ring signatures are performed on the identities of motorcade members on the basis of an elliptic curve. Hiding and public key updating are conducted on identities of motorcade members throughthe elliptic curve, the block chain and the ring signatures, the identities of the message senders are authenticated, and session keys are updated; the block chain is utilized to publish a public keycertificate and a reputation value of the vehicle; The vehicle inquires the public key, the public key validity and the current reputation value of the surrounding vehicles through the roadside unit,so that the addition of malicious vehicles is avoided; Updating of the public key can prevent information from being intercepted and tampered by malicious vehicles when the private key of the user issubjected to security threats. The privacy of registered users and the privacy of motorcade members are effectively prevented from being leaked, and the communication safety of the members in the motorcade is ensured.
Owner:XIAN UNIV OF POSTS & TELECOMM

Random ciphering method which needs to be deciphered by exhaust algorithm

The invention provides an accidental ciphering method by using an exhaustion method to decipher, the method is designed based on increasing the ciphering strength for the user identification information and the accidental cipher key, the method is mainly used for ciphering a backup private key, a certificate and important files. The ciphering process flow comprises: inputting the user identification information and the ciphering strength; calculating the length of the accidental cipher key according to the relationships among the length of the accidental cipher key, the ciphering strength and the preset deciphering program speed and generating the accidental cipher key of the length; ciphering the private key and the certificate to obtain the backups of the ciphered private key and the ciphered certificate by using the user identification information and the accidental cipher key according to the ciphering algorithm determined by the program, and locking the user identification information and the accidental cipher key in the cipher recognition information by the ciphering algorithm determined by the program. The backup generated by the ciphering method, however, the writing of the deciphering program, even inputting the correct user identification information, the exhaustion method is also used for deciphering, and not only the user identification information needs to be compared, but also the accidental cipher keys need to be compared.
Owner:刘海云

Method for directly and arbitrary separating code to encryption lock from software to implement protection of software protection

The invention provides a method for separating code to an encryption lock from an executable file directly comprising separating code to an encryption lock from an executable file directly, setting a clock timer and a random number generator in the intelligent card encryption lock, filling an interactive code for communication with the encryption lock in the vacancy of the executable file after the code is separated, the encryption lock dynamically decomposing, encrypting and protecting the code that is separated into the lock and needed to be executed continuously by using a specific protocol and algorithm, wherein a plurality of blocks are generated and the release of the block is determined by the normal executed time of the previous block, if the request for demanding the next block sent from the interactive code arrives in the encryption lock in the normal time period, an effective information will be released from the encryption lock, if not, an ineffective information is released. Moreover, a layer of encryption lock filter drive program is added to the encryption lock and the interactive code. Thereby, the illegal monitor and interception of the communication data in the communication link and system are prevented.
Owner:吴晓栋

Ciphering method for generating cipher code recognition information

The invention provide a ciphering method for generating cipher recognition information, the ciphering method is designed based on increasing the user identification information and ciphering strength of the random cipher key, the ciphering method is mainly used for adjusting the ciphering strength of the cipher recognition information composed of the user identification information and the random cipher key after being ciphered. The ciphering process flow comprises: inputting the user identification information and the ciphering strength; calculating the length of the random cipher key and generating the random cipher key of the length, according to the relationships among the length of the random cipher key, the ciphering strength and the prescribed deciphering program speed; obtaining the cipher recognition information composed of the user identification information and the random cipher key after being ciphered according to the ciphering algorithm user identification information and the random cipher key determined by the program by utilizing the user identification information and the random cipher key. According to the backup generated by the ciphering method, anyhow the deciphering program is written, even the user identification information is inputted correctly, the deciphering is performed by using the exhaustion method, not only the identification information are compared, but also the random cipher keys are also compared.
Owner:刘海云

Automobile key system with configurable safety strategy and realizing method thereof

The invention discloses a realizing method of an automobile key system with a configurable safety strategy. The realizing method comprises the following steps that a vehicle-mounted controller sends aconnecting request to an instruction server through a preset encryption key; the instruction server verifies the identity of the vehicle-mounted controller and sends an effective encryption key to replace the preset encryption key; the instruction server communicates with the vehicle-mounted controller through the effective encryption key; the safety strategy is configured to trigger updating andreplacing of the effective encryption key; and a user terminal obtains authorization through the instruction server and builds connection with the vehicle-mounted controller through near field communication. The identity of the vehicle-mounted controller is authenticated by multiple factors, a dynamic secret key algorithm is adopted, a secret key is replaced regularly, and the encryption strengthis high; the instruction server is used for distributing encrypted control instructions, and through the near field communication technology, a mobile phone and other types of digital mobile terminals can be a carrier of an automobile key, a solid physical automobile key does not need to be carried along for driving an automobile, and automobile authorization and use are more convenient.
Owner:上海航迹数据信息科技有限公司

Instantaneous consumption application processing method and system for intelligent card

The invention discloses an instantaneous consumption application processing method for an intelligent card. The instantaneous consumption application processing method comprises the steps of: consumption initialization: a terminal safety control module is used for calculating a temporary session key and a consumption ciphertext according to the random number taking response data obtained by a terminal from a card and a preset encryption rule; consumption instruction checking: the card receives the instantaneous consumption instruction sent from the terminal, and then checks the trading key data of the instantaneous consumption instruction and verifying the consumption ciphertext; and consumption instruction processing: after the trading key data checking and consumption ciphertext validation are passed, the consumption is processed. The invention also discloses a corresponding instantaneous consumption processing system for the intelligent card. The instantaneous consumption application processing method and system for the intelligent card can be used for increasing the instantaneous trading speed and ensuring the safety, reliability and stability of trading simultaneously, and meet the requirements of various high-speed consumption occasions.
Owner:WUHAN TIANYU INFORMATION IND

Encryption method in data transfer of electric power system

The invention discloses an encryption method in data transfer of an electric power system, which comprises the following steps: when a transmitting end transmits data to an opposite side, dividing the data for generating a plurality of data blocks; acquiring the voiceprint characteristic and other biological characteristic of a transmitter and quantifying to first biological characteristic data, dividing the first biological characteristic data for generating a plurality of first biological characteristic data blocks; integrating the first biological characteristic data with the data blocks and encrypting for obtaining a first cryptograph, wherein a plurality of intermediate detectors are arranged between the transmitting end and the receiving end, the intermediate detectors are used for performing different number of times of encryption according to different transmission speeds of the first cryptograph, thereby finally obtaining a plurality of different final cryptographs for received by the receiving end, wherein related data are recorded in encryption for providing reference data for decryption; performing decryption by the receiving end for obtaining second biological characteristic data and a decrypted plaintext; and comparing the second biological characteristic data with preset biological characteristic data for determining whether the plaintext is reliable.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Method for generating anti-counterfeiting code information

The invention discloses a method for generating anti-counterfeiting code information. The method comprises the following steps: step one, creating a value color table and an image library; step two, carrying out invoking by an external system by parameters including an internal code, Url and a prefix and starting an anti-counterfeiting information generation process; step three, combining the Url, prefix and internal code, calculating a check code, combining the Url, prefix and internal code with the check code, and forming a two-dimensional code; step four, generating an anti-counterfeiting numerical value information list; step five, in the two-dimensional code obtained in the step three, carrying out image index calculation, carrying out delivery processing on the total number of anti-counterfeiting images in the image library based on the calculation result to obtain an image index, and acquiring a corresponding anti-counterfeiting image from the image library; and step six, combining the two-dimensional code obtained in the step three, the anti-counterfeiting numerical value information list obtained in the step four and the anti-counterfeiting image obtained in the step five to generate anti-counterfeiting code information. With the method disclosed by the invention, invoking becomes simple; and the data storage pressure is low.
Owner:CHENGDU XINDELI ELECTRONICS CO LTD

Anti-counterfeit code generating device

The invention provides an anti-counterfeit code generating device. The anti-counterfeit code generating device is characterized by comprising a picture storage part, an input display part, a code acquiring part, a secret key generating part, an AES (advanced encryption standard) acquiring and encrypting part, an AES cutting part, a DES (data encryption standard) acquiring and encrypting part, a DES cutting part, an IDEA (international data encryption algorithm) acquiring and encrypting part and an IDEA intercepting part, wherein the code acquiring part is used for acquiring input product information, and encoding according to a certain predetermined rule so as to generate corresponding product serial numbers. The anti-counterfeit code generating device provided by the invention firstly encrypts a product serial number by an AES algorithm, and then divides the encrypted result obtained by the AES algorithm into two parts, wherein one part is encrypted by a DES algorithm so as to obtain a logistic anti-counterfeit complete code, and a logistic anti-counterfeit application code is intercepted from the logistic anti-counterfeit complete code; the other part is encrypted by an IDEA algorithm so as to obtain a product anti-counterfeit complete code, and a product anti-counterfeit application code is intercepted from the product anti-counterfeit complete code, so that compared with the prior art, the anti-counterfeit code generating device has the characteristics of high encryption intensity and difficulty in code cracking.
Owner:UNIV OF SHANGHAI FOR SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products