Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

66results about How to "Implement encrypted transmission" patented technology

Optical frequency hopping system based on optical circulator and transmitter

The invention discloses an optical frequency hopping system based on an optical circulator and a transmitter. The optical frequency hopping system includes: an annular modulation unit, whereinthe annular modulation unit comprises a plurality of optical circulators; the first port of each optical circulator receives different optical carriers; a second port of each optical circulator is connected with an optical coupler, each optical coupler is connected with a phase modulator and is combined with frequency hopping coding in a pseudo-random code generator to realize coding modulation of an optical carrier signal, and a third port of each optical circulator respectively outputs the coded and modulated optical carrier signal; a transmitter which is internally provided with the annular modulation unit and is used for transmitting the optical carrier signal encrypted by the annular modulation unit; a receiver which is used for receiving the encrypted optical carrier signal and decrypting the encrypted optical carrier signal through frequency hopping coding; and an optical fiber which is used for realizing carrier communication between the transmitter and the receiver. According to the invention, high-speed optical frequency hopping coding can be realized, a flexible and simple unit structure is provided, expansion to a multi-channel optical frequency hopping system is facilitated, and a communication system with higher confidentiality is provided.
Owner:INST OF SEMICONDUCTORS - CHINESE ACAD OF SCI +1

Software-defined Internet of Things network topology data transmission security management method and system

The invention provides a software-defined Internet of Things network topology data transmission security management method and system, and the method comprises the steps: deploying common nodes and aggregation nodes at Internet of Things network nodes, and enabling the nodes to communicate with each other; performing encryption algorithm configuration on common nodes and aggregation nodes; each adjacent node performing bidirectional identity authentication and key agreement, and each node recording credible nodes passing authentication around itself and suspicious nodes failing to be authenticated; periodically executing topology discovery, collecting topology information of common nodes by the aggregation nodes, forwarding messages of trusted nodes among the aggregation nodes, establishing a trusted path, and constructing a global topology view; sequentially forwarding and aggregating the topology state messages according to the determined trusted path; and determining newly added nodes and malicious nodes based on the global topology view, broadcasting, and updating the network topology structure of the Internet of Things. According to the invention, the security and reliabilityof data transmission can be effectively improved.
Owner:ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY +1

Monitoring video encryption transmission method, device, equipment and medium

The embodiment of the invention provides a monitoring video encryption transmission method and device, electronic equipment and a storage medium, and is applied to a monitoring access server in the articulated naturality web, and the method comprises the steps: responding to a monitoring check request transmitted by an articulated naturality web terminal in the articulated naturality web, callinga plurality of video data packets acquired by monitoring equipment corresponding to the monitoring check request from the Internet; generating encryption keys respectively corresponding to the plurality of video data packets according to the plurality of video data packets; encrypting the plurality of video data packets by adopting encryption keys respectively corresponding to the plurality of video data packets to obtain a plurality of encrypted video data packets; and respectively sending the plurality of encrypted video data packets and each encryption key to the articulated naturality webterminal through mutually independent data transmission channels, so that the articulated naturality web terminal respectively decrypts the plurality of encrypted video data packets by adopting the corresponding encryption keys. By adopting the technical scheme of the invention, the security of calling the monitoring video from the Internet can be improved.
Owner:VISIONVERA INFORMATION TECH CO LTD

Storied household graph management system based on generic tree apportionment model

ActiveCN103824157AAchieve seamless connectionReduce manual intermediate linksResourcesGraphicsSurveyor
The invention discloses a storied household graph management system based on a generic tree apportionment model. The system comprises a house wall editing module, a room definition module, an area apportionment calculating module and a house graph making and printing module. The house wall editing module is used for drawing house walls, defining the width of the walls and establishing the topological relation between the walls. The room definition module is used for automatically working out a room graph of a house according to wall data formed by the house wall editing module and classifying rooms of the house according to functional zones where the rooms of the house belong. The area apportionment calculating module is used for performing apportionment calculation according to the functional zones where the rooms of the house belong and calculating apportioned area and apportioned zones of all households. The house graph making and printing module is used for making and printing graphs according to a measuring scale, printing house household area list and the like, wherein the graphs are formed according to user house graph data. The dynamic error correction technology is adopted in the system, shared area apportionment is performed according to the standard apportionment model, and the accuracy and the reliability of area calculation in house property surveying and mapping management are improved.
Owner:NANJING NORMAL UNIVERSITY

Encrypted transmission method and encrypted transmission system for marine environment detection data

The invention discloses an encrypted transmission method and encrypted transmission system for marine environment detection data. Encrypted transmission and decryption processing of the collected marine environment data plaintext are completed through one-time communication. An encryption end uses the marine environment data plaintext to generate a data ciphertext by adopting a symmetric encryption method, and the symmetric secret key are safely processed by adopting a digital signature and an asymmetric encryption mechanism. The data ciphertext and the symmetric secret key which are subjectedto safety processing are packaged into a communication data packet to be transmitted to a decryption end. After receiving the data, the decryption end firstly performs decryption and authentication processing on the symmetric secret key, and then decrypts the data ciphertext by the processed symmetric secret key. The data plaintext is restored. The method and system disclosed by the invention areused for safe communication of observation data of ocean sensors, and have small communication cost. The effects of safety, low power consumption and high efficiency of marine environment detection data transmission are guaranteed.
Owner:程杰

Network secret key interaction system, device and method

The invention provides a network secret key interaction system, device and method. The system comprises a first device and a second device, wherein the first device is used for sending the generated first interaction information to the second device; the second interaction information sent by the second device after reception of the first interaction information is received; based on the first round of information contained by the first interaction information and the second round of information contained by the second interaction information, a temporary transmission secret key is generated;after the temporary transmission secret key is utilized to encrypt a randomly-generated network secret key, the network secret key is contained in the third interaction information, and the third interaction information with the network secret key is sent to the second device; after the third interaction information is received by the second device, a temporary transmission secret key is generatedbased on the first round of information contained by the first interaction information and the locally-generated second round of information, and the generated temporary transmission secret key is utilized to obtain the network secret key contained in the third interaction information. The system is advantaged in that the network secret key can be negotiated by multiple handshakes, the network secret key can be replaced in time when the network secret key is stolen, and security of wireless network communication is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Intelligent distributed feeder method and device based on 5G communication

The invention discloses an intelligent distributed feeder method and device based on 5G communication. The device comprises at least one switching station comprehensive intelligent terminal, a feeder switch, and a distributed FA terminal, the distributed FA terminal is installed at the switching station comprehensive intelligent terminal and a power distribution terminal in an overhead line, and is used for detecting the electric signal and the on-off state information of the feeder switch, and the switching station comprehensive intelligent terminal forms an annular auto-negotiation communication channel through the 5G wireless data terminal, and is communicated with the distribution network automation master station through the 5G communication topology network. Communication between power distribution terminals and communication of a master station are realized by utilizing the technical characteristics of low time delay and high bandwidth of a 5G network, wireless communication interaction can be realized after a line fault occurs, positioning, isolation and power transfer of a fault section can be automatically completed, the defects of long isolation and removal time existing in traditional feeder protection can be overcome, meanwhile, differential protection based on optical fiber communication can be replaced, and laying of optical fiber lines in engineering construction is not needed.
Owner:ZHENGZHOU ELECTRIC POWER COLLEGE

Train service data processing method and system based on quantum key

The invention provides a train service data processing method and system based on a quantum key, and the method comprises the steps: a locomotive client receives a business data processing request from a locomotive, and then calls an SATA password module to enter a business data encryption starting process; the SATA cryptographic module automatically judges whether effective static session key pairs and application key pairs exist or not, if not, entering an SATA cryptographic module self-checking mode, if yes, encrypting service data and subjecting to signature operation, wherein the encrypted first encrypted data are sent to the locomotive server side from the locomotive client side, and the locomotive server calls the quantum security service platform to decrypt the first encrypted data and returns the decrypted data ciphertext to the locomotive server, and the locomotive server correspondingly processes the business data. According to the invention, data encryption transmission of train operation production data from a train end to a business background is realized, so that comprehensive password protection is provided for locomotive operation control, state acquisition and sensitive data transmission.
Owner:安徽量安通信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products