Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

56results about How to "Improve data transmission security" patented technology

Power special quantum encryption gateway system

The invention provides a power special quantum encryption gateway system. The system comprises a power special quantum encryption gateway communicated with a gateway management device through a quantum link; the power special quantum encryption gateway is used for performing encryption communication through the quantum link or a classic link; a quantum secret key distributing device is integrally arranged on the power special quantum encryption gateway and comprises a vertical integration model and a transverse integration mode; the quantum link comprises a quantum secret key sending device and a quantum secret key receiving device which are connected with each other through an optical fiber or a free space; the gateway management device comprises a user authentication module, a user right/certificate management module, a quantum secret key management module and a communication interface module. Compared with the prior art, the power special quantum encryption gateway system provided by the invention is capable of synchronously supporting the traditional mode encryption function and the quantum mode encryption function, and capable of providing unconditional information security assurance for the power system data transmission under the quantum mode, and convenient for the large-scale deployment and industrial practicality of the power special quantum encryption network.
Owner:STATE GRID CORP OF CHINA +3

Digital public transport information publishing and cluster controlling method and device

The invention relates to a method used for digital bus information releasing and group control and a device thereof. The technical measure comprises the following steps: a vehicle terminal system, an electronic station board system and a vehicle technical information management centre are arranged, the electronic station board system is the vehicle technical information management centre are connected into a bi-directional communication network by line link, the vehicle terminal system transmits the vehicle information to the electronic station board system in a wireless communication, the electronic station board system reports the information to the vehicle technical information management centre, the bus coming to station at each station can be found out by inquiring a database, the station arriving time of the bus is calculated according to experimental data including average running speed, average running time between the stations and the like, finally, the arriving time is fed back to the electronic station board system, and the arriving time is displayed to the waiting passengers in a digital way. The method can effectively solve the problems of bus reduction in city and dispatching, information releasing, passenger facilitation, intelligent management control and the like. Therefore, the method realizes intelligent bus dispatching.
Owner:JIANGSU HANDSON INTELLIGENT TECH CO LTD

Encrypted data transmission method

FIELD OF THE INVENTION that present invention relate to the field of communications technology, A method for encrypt data transmission comprises the following steps: S1, a message body with the numberof bytes set as Ni2 is transmitted freely in Ni4 channels, a random number Ni1 is generated by using a timing counter, and the message body with the number of bytes set as Ni2 to be transmitted is randomly divided into Ni3 segment message body segmented data packets according to the random number Ni1; S2, the Ni3 segment message body segmented data packets separated in the previous step are randomly misordered by an encoder, and then are dynamically encrypted and transmitted in a random multi-channel manner; 3, message body is restored, wherein the receiving end receives the segmented data packets of each segment of the message body, stores and decrypts the true value of the restored data through a decoder, namely, reorganizing the segmented data of each segment of the message body into complete message body data according to a packet sequence number and a misordering rule, and sequentially splicing the segmented data of each segment of the message body. The invention solves the problem that the encryption mode of the existing intelligent security system is simple and easy to cracke and the intercepted information has the hidden danger of safety.
Owner:QUANZHOU HEYI ELECTRONICS CO LTD

Safe data transmission method, system and device and storage medium

The invention provides a data security transmission method, system and device and a storage medium, and relates to the technical field of network security. The method is applied to a first link encryption gateway in communication connection with one or more terminals, the first link encryption gateway is also in communication connection with a second link encryption gateway, and the method comprises the following steps: receiving a first encrypted message sent by a terminal; determining that the first encrypted message passes the authentication; decrypting the first encrypted message to obtaina first decrypted message; encrypting the first decrypted message based on an encryption mode agreed with a second link encryption gateway to obtain a second encrypted message; and sending the secondencrypted message to a second link encryption gateway through a secure channel between the second encrypted message and the second link encryption gateway, so that the second link encryption gatewaydecrypts the second encrypted message and sends the decrypted second encrypted message to the server. According to the method, a plurality of terminals share one link encryption gateway, and an independent link encryption gateway does not need to be arranged at each terminal, so that the hardware cost is reduced.
Owner:MAIPU COMM TECH CO LTD

Two-dimensional code big data secure transmission device based on dynamic multistage encryption and decryption

The invention discloses a two-dimensional code big data secure transmission device based on dynamic multistage encryption and decryption, and the device comprises a first data exchange interface whichis used for obtaining and sending to-be-exchanged data information; a data encryption module which is used for receiving the to-be-exchanged data information and carrying out dynamic multistage encryption; a two-dimensional code image generation module which is used for encoding the encrypted to-be-exchanged data to generate a two-dimensional code image; a two-dimensional code display module which is used for displaying the two-dimensional code image; the acquisition module is used for acquiring the two-dimensional code image; a two-dimensional code image recognition module which is used forrecognizing the collected two-dimensional code image and extracting feature data information; a data decryption module which is used for carrying out dynamic multistage decryption on the two-dimensional code feature data information; and a second data exchange interface which is used for outputting the decrypted exchange data; according to the invention, the data transmission capacity and the datatransmission security are greatly improved.
Owner:HAOYUN TECH CO LTD

Network information security intelligent analysis early warning management system based on multi-dimensional analysis

The invention discloses a network information security intelligent analysis early warning management system based on multi-dimensional analysis, and relates to the technical field of network information security. The problems that when a traditional network information security management system uses network transmission and data sharing as information storage and communication means, the system is lack of security protection, dangerous signals carried in transmission cannot be tracked in real time, and information updating is slow are solved. According to the network information security intelligent analysis and early warning management system based on multi-dimensional analysis, cross correlation and multi-angle combined analysis are performed on data in different dimensions through the supervision platform, high-level summarized data are refined and deepened into low-level detailed data, the accuracy of network information security analysis is greatly improved, and the network information security analysis efficiency is improved. Through a bottom layer driving filtering technology, various behavior operation requests are intercepted in real time, bad behaviors in data information operation are dynamically tracked, processed and detected, and a decision basis is provided for network management and optimization.
Owner:深圳市博博信息咨询有限公司

Efficient applicative safety private network transmission method and system based on internet of things

The invention provides an efficient applicative safety private network transmission method and system based on the internet of things. The method comprises the following steps: respectively implanting a safety control module for network transmission function extension in a logistics data acquiring end for transmitting the data in the internet of things and a logistics center server, wherein the safety control module at least comprises the following settings: an initialization operation for reading in a configuration file to call kernel information and setting the logistics center server port information and the information in a communication port of the logistics data acquiring end; an opening / closing instruction operation for defining a data transmission function between the transmission layers; a sending / receiving instruction operation for defining the transmission layer to perform the data transmission; and a data encryption / decryption instruction operation for defining the transmission layer to perform the data transmission; when the internet of things has the data to transmit, the transmission layer is only opened and the encryption / decryption communication is performed to realize the data communication of the network link private network; the logistics data received by the logistics center server is decrypted according to a preset decryption instruction, and the transmission layer is immediately closed after the transmission is accomplished.
Owner:上海枫昱能源科技有限公司

Cross-domain security access and resource control method for virtualization equipment

The invention discloses a cross-domain security access and resource control method for virtualization equipment, and the method comprises the steps: firstly carrying out the authentication of each virtualization equipment platform at an access control center; secondly, after platform authentication is passed, each set of virtualization equipment needs to be authenticated in an access control center; thirdly, the platform needs to carry out authentication confirmation on the access control center every time the virtualization equipment is started; after secondary authentication and confirmationof the virtualization equipment, encrypting a virtualization equipment starting command line by using an asymmetric encryption technology, and sending the encrypted virtualization equipment startingcommand line to an access control center; and finally, the access control center decrypts the virtualization equipment operation command line by using an asymmetric encryption technology, and sends the decrypted virtualized equipment operation command line to the resource pool starting equipment after meeting the resource allocation rule. The security of each virtualization platform and the virtual equipment is effectively improved, the utilization rate of virtual the virtualization resources is improved, the risk that the command line is captured and cracked in the transmission process is reduced and the network data transmission security is greatly improved.
Owner:北京安盛联合科技有限公司

Method for session re-detection of token validity after web system accesses unified authentication platform

The invention provides a method for session re-detection of token validity after a web system accesses a unified authentication platform. The method comprises the following steps that: (1), a web system generates a signature key according to an authorization token related information string; (2) the web system generates signature information corresponding to the authorization token related information string according to the signature key and a preset signature algorithm; (3) the web system generates an authorization token character string according to the authorization token related information string and the signature information, and sends the authorization token character string to the unified authentication platform; (4) the unified authentication platform analyzes the authorization token character string to obtain an authorization token related information string to be verified; (5) the unified authentication platform generates the signature key to be verified according to the related information string of the authorization token to be verified. According to the method, the effectiveness of the authentication token in the use process can be ensured, and the data transmissionsecurity is improved.
Owner:BEIJING EYOU INFORMATION TECH CO LTD

Data routing transmission control method of wireless autonomous monitoring network of wind farm

InactiveCN103442403AImprove the real-time performance of data transmissionReduce transmission delayNetwork topologiesHigh level techniquesTree clusteringData transmission
The invention provides a data routing transmission control method of a wireless autonomous monitoring network of a wind farm. By adopting the data routing transmission control method of a wireless autonomous monitoring network of a wind farm provided by the invention, when a node performing data transmission and a destination node are positioned in different sub-tree clusters, as long as a neighbor node meeting the routing conditions and the energy storage requirements exists, cross-tree cluster routing transmission is directly performed without the necessity of forwarding through a root node (a network coordinator) again, thus the routing path is effectively shortened, the routing transmission delay is reduced, and the real-time property of data transmission of the wireless autonomous monitoring network of the wind farm is improved; and moreover, the method also performs judgment on the energy storage conditions of the neighbor node, the phenomenon that ongoing data routing transmission cannot be supported due to insufficient energy storage of the neighbor node during the cross-tree cluster routing transmission is avoided, and the data transmission safety of the wireless autonomous monitoring network of the wind farm is improved.
Owner:CHONGQING UNIV

A special quantum encryption gateway system for electric power

The invention provides a power special quantum encryption gateway system. The system comprises a power special quantum encryption gateway communicated with a gateway management device through a quantum link; the power special quantum encryption gateway is used for performing encryption communication through the quantum link or a classic link; a quantum secret key distributing device is integrally arranged on the power special quantum encryption gateway and comprises a vertical integration model and a transverse integration mode; the quantum link comprises a quantum secret key sending device and a quantum secret key receiving device which are connected with each other through an optical fiber or a free space; the gateway management device comprises a user authentication module, a user right / certificate management module, a quantum secret key management module and a communication interface module. Compared with the prior art, the power special quantum encryption gateway system provided by the invention is capable of synchronously supporting the traditional mode encryption function and the quantum mode encryption function, and capable of providing unconditional information security assurance for the power system data transmission under the quantum mode, and convenient for the large-scale deployment and industrial practicality of the power special quantum encryption network.
Owner:STATE GRID CORP OF CHINA +3

Data encryption communication terminal method and device, terminal, server and storage medium

The invention discloses a data encryption communication terminal method and device, a terminal, a server and a storage medium, and the method comprises the steps: continuously executing a multi-time transport layer security protocol handshake process with a server side, and obtaining a plurality of symmetric encryption keys, wherein the message in the second handshake process is encrypted by using a first symmetric encryption key obtained in the first handshake process, a second symmetric encryption key is obtained through the second handshake process, the first handshake process and the second handshake process are any two adjacently executed handshake processes in multiple transport layer security protocol handshake processes, and the first handshake process is executed before the second handshake process; and according to the execution sequence of the multiple transport layer security protocol handshake processes, sequentially using the plurality of symmetric encryption keys to carry out data transmission with the server side. According to the method and the device, the counterfeited server side can be identified, so the data encryption effect is improved, the counterfeited server side cannot correctly decrypt the received encrypted data, and the data transmission security is improved.
Owner:EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products