Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

576results about How to "Implement encryption" patented technology

Chip, data communication method for chip, consumable container and imaging equipment

The invention provides a chip of a consumable container, which comprises a storage module, a control module, an interface module and a data safety module. The storage module is used for storing initial data, printing data, control data and key data; the interface module is used for realizing data communication between the storage module and the control module; the data safety module is respectively connected with the interface module and the control module, and is used for identifying a type and a content of data communicated between a printer and the chip, encrypting matched data in a selected safe mode and decrypting the data; the control module is connected with the storage module and is used for controlling data communication between the chip and the printer and the access operation of the data of the storage module and external data and sending a corresponding control command to the chip according to a safety module processing result so as to realize data communication; and the same keys are stored in the printer and the chip. The invention also provides a data communication method for the chip, the consumable container with the chip structure, and imaging equipment with the consumable container. The safety of the communication data of the chip can be protected.
Owner:ZHUHAI TIANWEI TECH DEV CO LTD

Intelligent vending machine

The invention discloses an intelligent vending machine. A payment module, a cargo transmission module, a commodity management module, an environment sensing module, a commodity state display module, an advertisement management module and an intelligent city module are arranged inside a machine body, wherein the commodity management module comprises a system management and communication center, a mobile display hand set and a remote vending machine operation terminal; the payment module comprises a mobile payment module, an iris payment module and a face payment module; the intelligent city module and the advertisement management module are used for displaying and inquiring relevant city information. The intelligent vending machine has the advantages that a manager can be timely notified to supplement cargos in time; the function of reminding the concrete position of the vending machine with the short lacked commodity distance is achieved; the cloud server can recommend buying commodity to the user according to the weather, temperature, geographic position and health preserving information sensed by the vending machine according to seasons; the user experience is enhanced; various payment functions are realized; convenience and high speed are realized.
Owner:永州巨米智能科技有限公司

Intelligent manufacturing special network data acquisition scheduling system

ActiveCN106603659ARealize control function refactoringRapid realization of control function reconfigurationTransmissionData acquisitionSmart manufacturing
The invention discloses an intelligent manufacturing special network data acquisition scheduling system. On the basis of conception of forwarding and control plane separation, a 4G special line intelligent scheduling system facing intelligent manufacturing is constructed, moreover, the system further satisfies concentrated scheduling and decentralized domain management functions, flexible network resource calling and rapid disposition capability are realized, standard northwards API interfaces are provided for the external, and concentrated management of wireless access equipment, on-demand scheduling and rapid security and other value-added service business opening are realized through SDN and NFV technologies. The system comprises five parts, including an internal network connected with manufacturing equipment in enterprises, a wireless access network based on 4G, a novel wireless access gateway connected with the internal network and an external network, a cloud platform used for carrying out concentrated network scheduling management, and various applications for intelligent manufacturing. The full-network configuration is realized through employing the cloud platform, network interconnection is realized through the novel access gateway, for network element functions, an SDN method is employed to separate a control plane from a data plane in an adaptive mode.
Owner:NANJING UNIV OF POSTS & TELECOMM

Large-capacity hiding method for reversible data in bitstream encryption domain of JPEG image

The invention discloses a large-capacity hiding method for reversible data in a bitstream encryption domain of a JPEG image. According to the method, a user performs exclusive or encryption on extension bits of entropy coding in each of image blocks according to an encryption key in JPEG bitstreams, performs pseudo-random scrambling on remaining AC coefficients except a last non-zero AC coefficient, and then performs the pseudo-random scrambling on the entropy coding of all the image blocks; a cloud performs embedding of extraneous information by a histogram shifting method on the AC coefficients in a bitstream ciphertext according to a hiding key, and can perform non-destructive extraction; and a receiver performs pseudo-random scrambling resumption on the entropy coding of ciphertext image blocks in the bitstream ciphertext according to the encryption key, and then the pseudo-random scrambling resumption and exclusive or decryption of the AC coefficients are performed in the entropycoding of each of the ciphertext image blocks to obtain decrypted bitstreams same as original JPEG bitstreams. The method not only achieves encryption of the extension bits of the entropy coding, butalso encrypts Huffman coding of the entropy coding; and the steganographic capacity is large, and the safety is high.
Owner:SOUTHWEST JIAOTONG UNIV

Method, device and system for encryption and decryption of communication

The invention discloses a method, a device and a system for encryption and decryption of communication, and relates to the field of information processing. A Javascript is utilized to realize encryption and decryption of communication so that safety of user information is guaranteed. The invention comprises an encryption process of communication and a decryption process of communication. The encryption process of communication comprises that: a first character string to be encrypted is extracted from information to be sent; the first character string is converted into first multiple binary numbers to be stored; the stored first multiple binary numbers are encrypted according to a preset encryption algorithm so that second multiple binary numbers are generated; the second multiple binary numbers are converted into a character string to be sent; and transmission encoding is performed on the character string to be sent and an encoding result is sent. The decryption process of communication comprises that: the information which is to be processed and is sent by a sending end is received; transmission decoding is performed on the information to be processed so that a third character string is obtained; the third character string is converted into third multiple binary numbers to be stored; the stored third multiple binary numbers are decrypted according to a preset decryption algorithm so that fourth multiple binary numbers are generated; and the fourth multiple binary numbers are converted into a fourth character string.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Color character encoding method and decoding method

The invention discloses a color character encoding method and a decoding method which solve the problems of an anti-counterfeiting code technology that the security is low and the appearance effect of a product is affected. The color character encoding method comprises the following steps that (1) N different colors are selected; (2) an N system encoding library is set up and the base of the encoding library is matched with the selected colors; (3) source information is input and converted into an M system code; (4) the M system code is converted into an N system code to obtain corresponding data; (5) the data is substituted through the colors which are matched with the base of the N system encoding library, lined and combined into a color character; and (6) the color character is output. The color character decoding method comprises the following steps that (1) the color character is identified and substituted into the M system code by terminal equipment; (2) the M system code is converted into a Unicode or an ASCII code; and (3) the terminal equipment converts the Unicode or ASCII code into source information and outputs the same. According to the color character encoding method and the decoding method, an anti-counterfeiting code manufacturing method is novel and the security is high.
Owner:曾芝渝 +3

Encryption method applied to MQTT-SN protocol

The invention relates to an encryption method applied to a MQTT-SN protocol, and relates to the field of communication. The method employs a harsh algorithm and ciphertext-policy attribute-based encryption method, so that a publishing terminal, an agent server and one or a plurality of subscription terminals can complete encrypted communication. The method herein includes the following steps: an agent server verifying the identity of a publishing/subscription terminal, performing registration of the publishing/subscription terminal, and generating a system common parameter; the publishing terminal encrypting a plaintext load by using the ciphertext-policy attribute-based encryption method; the publishing terminal transmitting the encrypted load to the agent server, the agent server forwarding the encrypted load to one or a plurality of subscription terminals; and the subscription terminal applying for a secrete key from the agent server, decrypting the encrypted load, obtaining a plaintext. According to the invention, the method can implement identity verification of a MQTT-SN protocol publishing/subscription terminal, data integrity verification, and data confidentiality protection, and better addresses the safety issues faced by the MQTT-SN protocol in terminals of wireless sensor network applications.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Authenticated encryption method and encryption system based on symmetric encryption

The invention discloses an authenticated encryption method and a system, relating to the field of communication security. The restorable signature of a message and the symmetric encryption technologyare combined; a commitment value which only can be calculated by a designated message receiving end is used as a session key encryption message; and the message receiving end validates the validity ofthe message by the restorable signature, thus realizing encryption and authentication in one logical step. A key generation unit of a sending end generates a session key of the sending end; an encryption unit encrypts a message to be sent; the receiving end generates a session key of the receiving end; a decryption unit utilizes the session key of the receiving end to decrypts the encrypted message; and the authentication and confirmation message is generated according to the decrypted message, thus validating the validity of the message. When disputes occur, the message receiving end transforms the authenticated and encrypted message signature into a common signature so as to lead a third party to validate the validity of the signature. The invention has the advantages of high security,low calculated amount and transmission cost, and the like.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Two-dimensional code compiling method

The invention discloses a two-dimensional code compiling method. The two-dimensional code compiling method comprises the following steps of: on the basis of a self-adaptive code compiling extended black and white code compiling technology and a code compiling scheme applicable to different multimedia, introducing an interweaving technology into an error-correcting code compiling technology by using a data compression technology with an open structure during compression code compiling; and adopting an advanced morphologic image pre-processing technology based on multi-scale structural analysis. The two-dimensional code compiling method has the advantages that a two-dimensional code is superior to the conventional two-dimensional code standard in terms of information bearing capacity, robustness, safety, reliability and adaptability; and coding and decoding bottom-layer supporting software provides technical support for various types of application of the two-dimensional code to the field of the internet of things in an open interface mode, the market monopoly position of the conventional foreign two-dimensional code standard can be broken, the chaotic situation of the conventional domestic two-dimensional code application is changed, and a firm foundation is laid for the development of the internet-of-things industry.
Owner:江苏圆坤二维码研究院有限公司

Novel image encryption method based on correlation between chaos and plaintext

InactiveCN105513002ABreak strong correlationImplement encryptionImage watermarkingPlaintextDiffusion
The invention provides a novel image encryption method based on correlation between chaos and plaintext. The method comprises the steps: carrying out row and column updating of a plaintext image A, and obtaining a processed image E; employing the modular operation of a gray level 256, changing the pixel sum of the image through the modular operation between rows and the modular operation between columns, and breaking the strong correlation between the adjacent rows and the adjacent columns of an original plaintext image; enabling the pixel sum s of the image E to serve as the feature of the image, extracting the feature of the image, participating the generation of a key stream, carrying out the second layer encryption through scrambling encryption, and obtaining an image Q; and solving a problem that a conventional algorithm employs the same key stream while encrypting different images. Through the gray value diffusion of the image, the method builds the mutual influence between two adjacent pixels, and a secret key directly participates in the output of a ciphertext image. In order to achieve an avalanche effect, the mutual influence between two adjacent pixels is built through the key stream. Meanwhile, a second group of secret keys are designed to participate in the output of the ciphertext image, thereby achieving the third layer encryption.
Owner:GUANGDONG OCEAN UNIVERSITY

Electronic cigarette controlled through mobile phone software, and control method thereof

The invention discloses an electronic cigarette controlled through mobile phone software, and a control method thereof. The electronic cigarette comprises an atomizer and a battery component, whereinthe atomizer comprises a heating resistor which is used for heating and atomizing the tobacco liquid of the electronic cigarette; the battery component comprises a battery and a circuit control board,an element and a circuit arranged on the circuit control board comprise a microcontroller, a Bluetooth data transmission unit and an unlocking switch unit; the Bluetooth data transmission unit is provided with a mobile phone software control terminal which is a mobile phone APP installed on a smartphone; the mobile phone APP is provided with encryption information; the encryption information is sent to the Bluetooth data transmission unit through mobile phone Bluetooth, and is then transmitted to the microcontroller; and after the microcontroller identifies the encryption information, throughthe unlocking switch unit, unlocking startup is carried out. The electronic cigarette has the beneficial effects that the encryption of the electronic cigarette and the customization of personal usecan be effectively realized through the control of the mobile phone APP, and juveniles can be prevented from smoking the electronic cigarette so as to avoid bad influences for the society and families.
Owner:HUIZHOU HAPPY VAPING TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products