Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

303results about How to "Improve communication security" patented technology

Authentication system and working method thereof

The invention discloses an authentication system and a working method thereof and belongs to the information security field. The method includes the following steps that: when receiving an access request, a server generates a first challenge value and sends the first challenge value to a client; the client uses a preset Hash algorithm to carry out Hash calculation on the first challenge value to generate a challenge Hash value; when judging that a received identification code is matched with a pairing code stored in an identity authentication module, the identity authentication module uses a private key corresponding to the pairing code to calculate the challenge the Hash value according to a preset signature algorithm so as to obtain a signature value; the client generates a signature verification request according to the signature value and sends the signature verification request to the server; and the server authenticates the signature verification request, and a user is allowed to access requested resources if the authentication is successful, and the user is not allowed to access the requested resources if the verification fails. With the authentication system and the working method thereof provided by the technical schemes of the invention adopted, communication can be continued as long as the identity authentication module completes local authentication, and therefore, the problem of data leakage in a data transmission process can be prevented, and the security of the communication can be improved.
Owner:FEITIAN TECHNOLOGIES

Method and system for quantum communication security

The invention relates to a method and a system for quantum communication security. An Alice terminal comprises a watchdog detector, an optical attenuator, a phase modulator, a reflector, a controller and a photon emitter; and a Bob terminal comprises a laser, a time division multiplex / demultiplex system, a phase modulator, a single photon detector, a controller, an optical switch and a reflector. The method and the system have the advantages that: (1) the two-way, stable and safe distribution of quantum keys is realized, the polarization and phase change of a single photon can be automatically compensated, and the aim of stable long-distance transmission is achieved; (2) the Alice terminal adopts the watchdog detector, on one hand, Trojan attack and intermediary attack can be detected by measuring the number of weak pulses reaching or leaving the Alice terminal, so that the communication security is improved greatly, and on the other hand, the communication speed and communication distance of the system are improved greatly; and (3) the Alice terminal and the Bob terminal can be adjusted and corrected respectively, can select mu independently without transmitting photons by means of unsafe optical fiber lines so as to ensure the system security.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method

The invention discloses an application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method. The application program communication processing system comprises a client and a server, wherein the client generates a request message including request information, signature information and a session key, carries out the signature and encryption by utilizing a client private key certificate, a session key and a server public key certificate in the generation process, transmits the request message to the server and receives a response message transmitted by the server after the request message is parsed; the server parses the received request message transmitted by the client and transmits the response message to the client, wherein the server performs the decryption and verification by utilizing a server private key certificate and a client public key certificate in the process of parsing the request message. By adopting the scheme provided by the invention, the application program communication safety can be improved.
Owner:GUANGZHOU AIJIUYOU INFORMATION TECH

V2X-based roadside unit system and information distribution method thereof

The invention provides a V2X-based roadside unit system and an information distribution method thereof. The system mainly comprises a communication network management module, a message proxy module, an information security component module, a log management component module, a message bus interface module and the like. An RSU (roadside unit) message proxy module is responsible for parsing, priority scheduling and distribution of messages, sent by an application layer through a message bus interface, to a message bus. The RSU communication network management module is responsible for shieldingprotocol difference of a platform and RSU auxiliary communication equipment, and a unified communication calling interface is provided for middleware message proxy. According to the system and the method in the invention, heterogeneous network multi-source information from a road sensor, a vehicle, a cloud platform, a differential positioning base station and the like is managed through the V2X RSU in a unified way, a unified communication calling interface is provided for an upper-layer application, and the application development efficiency and the function expandability are improved; the messages are scheduled on the basis of a priority policy so as to ensure that the information with relatively high information tightness is preferentially sent.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Two-dimensional bar code duplex communication method

The invention discloses a two-dimensional bar code duplex communication method and aims at providing the duplex communication method based on two-dimensional bar codes. According to the duplex communication method, the communication security is high and the data transmission efficiency and reliability are high in a scene with a relatively high confidentiality demand. The method is realized throughutilization of the following technical scheme that a sending end codes to-be-transmitted data into a two-dimensional bar code image sequence and displays the two-dimensional bar code image sequence in sequence through utilization of a miniature liquid crystal display; a receiving end collects the two-dimensional bar code image sequence through utilization of a vision camera or a two-dimensional bar code scanner, carries out repeated frame elimination, image graying, median filtering and binarization preprocessing on collection results and decodes the collection results according to a two-dimensional bar code coding format, thereby acquiring decoding results; the receiving end integrates the decoding results according to frame serial numbers and the frame number, thereby acquiring a sending end source transmission file; and the receiving end carries out real-time feedback or delayed feedback on a receiving result according to system transmission configuration. According to the method,the defect of a data transmission security hinge is solved.
Owner:10TH RES INST OF CETC

Data safety protection method, intelligent device, server and readable storage medium

The invention provides a data safety protection method, an intelligent device, a server and a readable storage medium. The data safety protection method comprises the steps of when over-the-air firmware updating is required, transmitting intelligent device authentication information and a server identity verification information request to a server according to a preset period, wherein the intelligent device authentication information comprises the attribute information of the intelligent device; receiving server identity verification information transmitted from the server, wherein the serveridentity verification information is generated by the server in confirming validity of the intelligent device according to the obtained attribute information of the intelligent device and the storedinformation itself after receiving the server identity verification information request; verifying the received server identity verification information, and when verification succeeds, establishing asafe communication connection with the server. The data safety protection method, the intelligent device, the server and the readable storage medium can improve communication safety in the system upgrading process of the intelligent device.
Owner:BEIJING SPREADTRUM HI TECH COMM TECH CO LTD

Android storage application sandbox based on application program virtualization, and communication method thereof

ActiveCN106384045AOvercomes the disadvantage of restricting the permissions of untrusted applicationsImprove communication securityPlatform integrity maintainanceVirtualizationOperational system
The invention discloses an Android storage application sandbox based on application program virtualization. The Android storage application sandbox comprises an agent and a target, wherein a strong secure boundary used for securely isolating untrusted application programs exists between the target and the agent; the agent is an application program process, owns all platform permissions distributed by a system, can normally interact with Android middleware and is used as all interactive compulsory agents between the target and an Android system; the agent comprises an API (Application Program Interface) layer, a core logic layer and a virtual layer; and the target does not have a platform permission, can not access Android firmware, can not change a file system and comprises sandbox service, a Binder interprocess communication interceptor and a system calling interceptor. Safety provided by an isolation process is used, and the untrusted application programs are dynamically loaded and executed in the process to avoid revising an operating system and the untrusted application programs. Meanwhile, a controllable method is used for permitting the untrusted application programs to execute an input / output operation and access system resources, and the untrusted application programs are packaged in the sandbox environment.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Low-power and high-security vehicle anti-theft tracking system and method thereof

The invention discloses a low-power and high-security vehicle anti-theft tracking system and a method thereof and belongs to the technical field of automobile anti-theft technology. The low-power andhigh-safety vehicle anti-theft tracking system comprises a monitoring and management platform, a mobile phone terminal and an anti-theft vehicle monitoring module, wherein the monitoring and management platform is respectively connected with the mobile phone terminal and the anti-theft vehicle monitoring module through wireless network for communication; the anti-theft vehicle monitoring module isarranged in a vehicle and comprises a vehicle monitoring and alarming module and an encryption and decryption communication module; the vehicle monitoring and alarming module is connected with an actuator in the vehicle; the encryption and decryption communication module is connected with the mobile phone terminal to realize data communications; a security chip is arranged inside the mobile phoneterminal; the security chip is positioned on a motherboard in the mobile phone terminal and connected with an application processor chip and a baseband chip on the motherboard for communication; andthe mobile phone terminal is provided with a mobile terminal app for supporting the use of the security chip. The low-power and high-safety vehicle anti-theft tracking system can monitor the conditionof the vehicle in real time and take corresponding protection measures when the vehicle is stolen, so as to achieve high communication security and solve the problems in the prior art.
Owner:济宁中科智能科技有限公司

Industrial network boundary protection system

The invention provides an industrial network boundary protection system. The industrial network boundary protection system comprises a production network system, a data acquisition network system, anoffice network system and an industrial firewall system; the production network system is connected to the data acquisition network system through the industrial firewall system, so that one-way datatransmission can be realized; both control and operation on equipment can be completed in a production network; the data acquisition network system comprises an industrial control safety audit platform; and the office network system further comprises an industrial control system information security supervision and analysis platform, a production scheduling system and a client side. According to the industrial network boundary protection system provided by the invention, behaviour analysis on the data acquisition network system, the production network system and communication of the data acquisition network system is made through the industrial control safety audit platform; the communication link state in a network can be monitored in real time through an abnormal monitoring module; the security of the industrial network boundary protection system is improved; depth inspection on a data packet based on an application layer can be carried out through the industrial firewall system; thecommunication security is improved; and the industrial network boundary protection system has the obvious effect for core asset protection of the production network system.
Owner:南京世界村云数据产业集团有限公司

Safety communication method suitable for remote control with limited capability at controlled end

The invention discloses a safety communication method suitable for remote control with a limited capability at a controlled end. The method comprises the following steps of: setting password sets at a control end and the controlled end and generating a password set according to an input initialization password by an irreversible method, wherein the password set comprises an index number and the password per se and encryption and decryption are performed by using the password corresponding to the recorded index number in a normal communication process; when the password is asynchronous, transmitting the index number by encrypting to perform password synchronization; and when a password set updating condition is met, negotiating about the update of the password set by transmitting a selected index number. A password set generating device for calculating the password set and communicating with the controlled end only when the password set is needed to be generated is arranged at the controlled end. Various attacks are resisted effectively by using a dynamic password and operation of real-time password calculation needed by the transmission of each data packet is avoided. Simultaneously, the password per se does not need to be transmitted on a communication link in password synchronizing and password set updating processes, so that simpleness and safety are realized.
Owner:SOUTH CHINA UNIV OF TECH

Car anti-theft method and system based on fingerprint secret key encryption technology

The invention relates to a car anti-theft method and system based on a fingerprint secret key encryption technology. The car anti-theft system based on the fingerprint secret key encryption technology is composed of a car key and an anti-theft control sub-system, a user sends an unlocking command on the key and inputs the fingerprint on a fingerprint collection module, a fingerprint image is converted into finger characteristic points through a fingerprinting characteristic processing module, an encryption conversion module generates a ciphertext data package through a fingerprint secret key technology, the ciphertext data package is transmitted to a data decryption module of the anti-theft control sub-system in a wireless communication mode, the data decryption module calls all the fingerprint characteristic points stored in a fingerprint characteristic repository to decrypt the ciphertext data package, a car body controller determines whether to execute a door opening operation according to received plaintext data, and an engine management unit determines whether to allow an engine to prepare for ignition according to the received plaintext data. According to the car anti-theft method and system based on the fingerprint secret key encryption technology, based on the uniqueness of the fingerprint characteristics, the fingerprint secret key encryption technology is adopted, communication safety is improved, engine ignition authority verification is added, and the anti-theft performance of the car is effectively improved.
Owner:JIANGSU UNIV

Vehicle-mounted network security authentication method, device, storage medium and vehicle

The invention relates to a method, a device, a storage medium and a vehicle for securing authentication of a vehicle-mounted network. When a first vehicle-mounted communication device sends a communication request to a second vehicle-mounted communication device, the first authentication information sent by the first vehicle-mounted communication device and the second authentication information sent by the second vehicle-mounted communication device are received. whether the first vehicle-mounted communication device is an authorizing device is authenticated by the preset authentication strategy according to the first authentication information and authenticating whether the second vehicle-mounted communication device is an authorizing device is authenticated by the preset authentication strategy according to the second authentication information; When both the first vehicle-mounted communication device and the second vehicle-mounted communication device are the authorization devices,authentication passing information is sent to the first vehicle-mounted communication device and the second vehicle-mounted communication device, respectively, so that the first vehicle-mounted communication device communicates with the second vehicle-mounted communication device.
Owner:BEIJING AUTOMOTIVE IND CORP +1

Web management system for power LTE wireless terminal and terminal authentication method thereof

The invention provides a Web management system for a power LTE wireless terminal and a terminal authentication method thereof. The Web management system comprises a Web server. The Web server comprises a terminal identity authentication module and a CGI (Common Gateway Interface) program module. The Web server carries out terminal identity authentication on a CPE terminal through the terminal identity authentication module, so the CPE terminal can access a power LTE wireless private network. A private key and a certificate generated by an SSL (Secure Socket Layer) tool are stored in the Web server. A user accesses an HTML static webpage of the Web server in an HTTPS mode based on an SSL protocol through a client Web browser, and further the CGI program module is triggered to carry out a corresponding function unit program. According to the system and the method, the secure embedded Web server is established through utilization of the common gateway interface (CGI) and the secure socket layer (SSL); terminal information query and terminal parameter configuration functions are realized on a power LTE-1.8GHz wireless CPE terminal; and the system and the method adapt to a power service device well and have relatively good application prospect.
Owner:NANJING NARI GROUP CORP +1

Method for encrypting communication between UAV (unmanned aerial vehicle) and ground station

The invention relates to a method for encrypting the communication between a UAV (unmanned aerial vehicle) and a ground station. The method comprises the steps that the ground station sends a controlcommand to the UAV; the UAV verifies the control command, and after verification succeeds, the UAV sends a UAV ID to the ground station; the ground station verifies the UAV ID, after verification succeeds, the ground station sends a data request to the UAV, and reveals a ground station public key to the UAV; the UAV receives the data request and the ground station public key, then generates a session key, encrypts the session key and returned data by using the ground station public key, then packs and sends the encrypted session key and returned data to the ground station; and the ground station performs decryption according to a ground station private key. According to the method, data transmitted between the UAV and the ground station is encrypted based on an asymmetrical encryption method, uplink data and downlink data between the UAV and the ground station are guaranteed to be transmitted in a form of ciphertext, so that the UAV is prevented from being controlled maliciously and data is prevented from being stolen and being used illegally, and communication between the UAV and the ground station is safer.
Owner:长春草莓科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products