Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

35results about How to "Implement encryption protection" patented technology

File redirection technology based virtualized security desktop

The invention discloses a file redirection technology based virtualized security desktop. Validity in using the security desktop is guaranteed through a login control module; operation behavior results of users can be reliably protected by an encrypted virtual storage file system; the operation behavior results of the users in the virtualized security desktop are 'internally' redirected to the encrypted virtual storage file system through a user operation middle layer and the whole redirection process is encrypted and monitored under a communication encryption module and a black and white list control module. The virtualized security desktop system is 'totally separated' from an original desktop, operations of adhering, copying, shifting and the like of the files cannot be performed between the virtualized security desktop system and the original desktop; the files on an original desktop system are mapped to the same catalog on the virtualized desktop; results (files, register lists, temporary cache and the like) generated from operation of the users in the virtualized desktop are encrypted for redirection treatment, and all the operations in the virtualized desktop are guaranteed to be safe, reliable and controllable.
Owner:中电科网络安全科技股份有限公司

Quantum encryption microwave relay communication system and quantum encryption microwave relay communication method

The invention discloses a quantum encryption microwave relay communication system and a quantum encryption microwave relay communication method. The system comprises a terminal station I, a relay station, and a terminal station II. The terminal station I is used for performing encryption operation on a key k with a key k1 to generate a key e1 and sending the key e1 to the relay station. The relay station is used for performing decryption operation on the key e1 with the key k1 to generate the key k, performing encryption operation on the key k with a key k2 to generate a key e2, and sending the key e2 to the terminal station II. The terminal station II is used for performing decryption operation on the key e2 with the key k2 to generate the key k. The key k1 is generated by the terminal station I and the relay station through a quantum key distribution terminal. The key k2 is generated by the terminal station II and the relay station through the quantum key distribution terminal. Finally, the terminal station I and the terminal station II have the same key k. The key k is relayed through the process. Through key relay transfer, transfer of the key k from the terminal station I to the terminal station II is realized.
Owner:ANHUI QASKY QUANTUM SCI & TECH CO LTD

Image encryption method and device, image decryption method and device, electronic equipment and storage medium

PendingCN112035847AImplement local encryptionRestrict accessDigital data protectionComputer hardwareEngineering
The invention discloses an image encryption method and device, an image decryption method and device, electronic equipment and a storage medium. The image encryption method comprises the following steps: dividing a to-be-encrypted image into a plurality of rectangular pixel blocks with the same size; taking the rectangular pixel block covered by the area needing to be encrypted as an encryption block; sequentially carrying out intra-block pixel scrambling and inter-block scrambling on all the encryption blocks; and replacing the encryption blocks before scrambling with the scrambled encryptionblocks in sequence to form an encrypted image. The image decryption method includes: dividing the image to be decrypted into a plurality of rectangular pixel blocks with the same size during decryption; determining an encryption block from all the rectangular pixel blocks; performing inter-block reverse scrambling and intra-block pixel reverse scrambling on all the encrypted blocks to obtain decrypted pixel blocks; and replacing the corresponding encryption blocks with the decryption pixel blocks in sequence to form a decrypted image. According to the invention, the user can restrain the access permission of part of people to part of image content. When the condition is allowed, the user or the authorized party restores the original content through the protected image.
Owner:湖北微模式科技发展有限公司

Quick logistics intelligent information encryption method

The invention relates to a quick logistics intelligent information encryption method. A sender logistics management terminal forms an express waybill number-weather number database containing a corresponding relationship between an express waybill number and a weather condition, and respectively encrypts by using different encryption methods to obtain two pieces of secret embedding information; the weather number corresponding to the current express waybill number and the two secret embedding information are fused to obtain intelligent secret embedding information, and the received intelligentsecret embedding information on the express waybill is sent to a logistics company management system by a receiver logistics management terminal; and the logistics company management system feeds back express waybill information (including sender information and receiver information) corresponding to the intelligent secret embedding information to the receiver logistics management terminal, and the receiver logistics outlet arranges personnel to deliver the express waybill. The sender and receiver information on the express waybill is always presented in an encrypted form of intelligent secret embedding information, and only the logistics company management system and the sender logistics management terminal master the personal information of the sender and the receiver, so that the information encryption protection in the logistics process is effectively realized.
Owner:ZHEJIANG WANLI UNIV

Supervisable zero-knowledge proof verification method and system in block chain

The invention provides a supervisible zero-knowledge proof verification method and system in a block chain, and the method comprises the steps: creating a main account of a user through a client, obtaining a main address which is in one-to-one connection with the identity of the user, and recording the main address in a block chain smart contract; generating a public and private key pair of the user according to the main address, and broadcasting the public and private key pair of the user to the whole block chain network; obtaining a secondary address of the user based on the public and private key pair of the user and the public key of the supervisor; performing legality verification on the transaction initiated by the user through the main address recorded by the block chain smart contract; if it is judged that the transaction is legal, executing the transaction; otherwise, enabling the supervisor to judge the relevance between the primary address and the secondary address of the user through ring signature confusion, and obtaining the identity information of the user. According to the embodiment of the invention, the encryption protection of supervisible anonymous and sensitive data of the user identity is realized, and the verification of data authenticity by a consensus node is supported.
Owner:CHINA INTERNET NETWORK INFORMATION CENTER

An information construction method for notarization to participate in judicial auxiliary affairs

The present invention is an informatization construction method for notarization to participate in judicial auxiliary affairs, which belongs to the technical field of informatization construction methods for notarization in judicial auxiliary affairs; the technical problem to be solved is: to provide an informatization construction method for notarization to participate in judicial auxiliary affairs Improvement; the technical solution adopted to solve the above-mentioned technical problems is: an information construction method for notarization to participate in judicial auxiliary affairs, including the following steps: constructing the overall information architecture of judicial auxiliary affairs: the overall information architecture includes the infrastructure layer, Resource and application support layer, business application layer, display layer, and operation and maintenance management subsystem, information security subsystem, and interface specification subsystem as auxiliary management; build infrastructure layer; build resource and application support layer; build business application layer; Build the display layer; build the operation and maintenance management subsystem; build the information security subsystem; build the interface specification subsystem; the invention is applied to judicial assistance.
Owner:山西瑞呈物联网科技有限公司

Informatization construction method for notarization participation of judicial assistant affairs

The invention discloses an informatization construction method for notarization participation of judicial assistance affairs, and belongs to the technical field of informatization construction methods for notarization participation of judicial assistance affairs. The technical problem to be solved is to provide an improvement of an informatization construction method for notarization participation in judicial assistance affairs. The informatization construction method for notarization participation of judicial assistance affairs, wherein the method comprises the following steps: constructing an informatization overall architecture of judicial assistant affairs, wherein the informatization overall architecture comprises an infrastructure layer, a resource and application support layer, a business application layer, a display layer, and an operation and maintenance management subsystem, an information security subsystem and an interface specification subsystem which are used as assistant management; constructing an infrastructure layer; constructing a resource and application support layer; constructing a business application layer; constructing a display layer; constructing an operation and maintenance management subsystem; constructing an information security subsystem; and constructing an interface specification subsystem. The method is applied to judicial assistance.
Owner:山西瑞呈物联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products