Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

240results about How to "Improve encryption" patented technology

Block chain-based distributed logistic tracking method

A block chain-based distributed logistic tracking method is disclosed and comprises the following steps: an order is placed by a user via a conventional information system, the order is distributed to an order node, and order information is generated; upper node private key decryption verification is adopted for a warehouse node, package information is generated and stored in a block chain after successful verification, and packaging operation is conducted by a sorter; the package is picked up via a package pickup and sending node, the upper node private key decryption verification is adopted, package pickup information is generated and stored in the block chain after successful verification, an optimal transport route is calculated, the upper node private key decryption verification is adopted for a transport node, transport information is generated and stored in the block chain after successful verification, the upper node private key decryption verification is adopted for a package delivery node, package delivery information is generated and stored in the block chain after successful verification, an express delivery worker sends the package to the user who places the order, the upper node private key decryption verification is adopted by the user, and signing information is generated and stored in the block chain after successful verification. Via the block chain-based distributed logistic tracking method, encryption performance and safety of data flows can be greatly improved, the optimal route is provided, and whole course data can be monitored and traced.
Owner:无锡井通网络科技有限公司

Image encryption method based on hyperchaotic system and multi-level scrambling

The invention discloses an image encryption method based on a hyperchaotic system and multi-level scrambling. The image encryption method comprises the following steps: firstly, acquiring a hyperchaotic sequence K through the hyperchaotic system; converting an original image into a two-dimensional matrix with the size of L= H x W, wherein H and W are dimensions of rows and columns of a matrix respectively; then converting original image pixel information into a one-dimensional vector sequence P, performing pixel-level, bit-level and DNA-level scrambling on the sequence P through an index sequence generated by the hyperchaotic sequence K, performing an exclusive OR operation on a pixel sequence through a mapping sequence, encrypting the original image to obtain an encrypted DNA sequence through binary bit conversion, DNA coding and DNA base operation, and converting the encrypted DNA sequence into a binary bit sequence B2; and finally, converting the sequence B2 into an encrypted image.According to the image encryption method based on the hyperchaotic system and the multi-level scrambling provided by the invention, the image is scrambled and encrypted at the pixel level, the bit level and the DNA level, the key sensitivity is high, the encryption effect of the image is effectively improved, attack operations such as statistical analysis and exhaustive analysis can be effectively resisted, and the safety is high.
Owner:SOUTHWESTERN UNIV OF FINANCE & ECONOMICS

Hardware encryption protection method and system for cellphone data

The invention discloses a hardware encryption protection method and system for cellphone data. The hardware encryption protection method includes utilizing ID (identity) of a cellphone, IMEI (international mobile equipment identity) numbers of an SIM (subscriber identity module), SNs (serial numbers) of a storage chip and name of a source file as dynamic parameters, calling a key generating module and an AES (advanced encryption standard) encrypting and decrypting module to generate Keys for encryption and decryption by being matched with logic calculation; calling a hardware encrypting module to encrypt the file or data for the source file. The key generating module, the AES encryption and decryption module and the encryption and decryption module operate file storage equipment through the storage chip, data encryption and decryption are completed, and the storage chip is welded on a circuit board of the cellphone and provided with an independent core processor. The hardware encryption protection technology for the cellphone data overcomes the defects of the prior art, is free of system resource occupation, has high performance, safety and reliability, and can effectively meet the encryption protection requirements on important files of people.
Owner:深圳市中易通安全芯科技有限公司

Hill encryption and dynamic DNA coding based image encryption method

The invention discloses a hill encryption and dynamic DNA coding based image encryption method which is used for solving the problem that an existing image encryption algorithm is too complex and is liable to crack. The hill encryption and dynamic DNA coding based image encryption method is characterized in that a hill encryption matrix is constructed to perform replacement encryption on an imageby adopting a method combining a hyperchaotic system with an elliptic curve, so that strong dependency among elements is avoided, and complexity and difficulty in realizing of elliptic curve encryption are avoided, and therefore, the encryption algorithm is simple; a dynamic DNA coding rule is combined, and the coding rule is randomly selected according to different positions of pixels for performing DNA coding on the pixels, so that safety of the encryption algorithm is improved, and dependency among secret keys is reduced, therefore, a ciphertext is difficult to crack; and finally, a hyperchaotic sequence is used for scrambling the image. The hill encryption and dynamic DNA coding based image encryption method improves secret key sensibility, safety of transmitted data, further can effectively resist known plaintext and selected plaintext attack, has relatively good ability of resisting exhaustive attack, statistical attacks and differential attacks.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Electronic equipment, and identification system and decryption method thereof

The invention discloses an identification system, which is used for being matched with a central processing unit of electronic equipment, so that three-dimensional modelling of a human face is realized. The identification system comprises multiple face shooting modules, an infrared light emitting device and an eye shooting module; the multiple face shooting modules are in signal connection with the central processing unit, and used for respectively shooting different parts of the human face, so that different facial information is obtained; the infrared light emitting device can emit infrared ray; and the eye shooting module is matched with the infrared light emitting device, and used for shooting eyes of a human, so that iris information is obtained. By means of the identification system provided by the invention, acquisition of three-dimensional information of a face can be realized through the multiple face shooting modules 1; furthermore, an iris identification manner is combined; compared with the manner of only acquiring two-dimensional information of the face by using a single camera, the security reliability and the robustness of the electronic equipment are relatively high; and the privacy of users can be protected more safely. The invention further relates to the electronic equipment having the identification system, and a decryption method for decrypting the electronic equipment.
Owner:TRULY OPTO ELECTRONICS

Method for achieving data security communication by applying blockchain encryption technology

The invention discloses a method for achieving data security communication by applying a blockchain encryption technology, and relates to the technical field of data encryption. According to the invention, a secure communication system comprising a data layer, a data encryption layer, a data network layer, a data transmission layer and a data application layer is constructed; a block chain technology is integrated into data communication, safe transmission of data is realized, the transmitted data can be shared and cannot be tampered, the encryption performance of the data is improved, remote,online and real-time acquisition and application of the data can be achieved through systematic construction, and a user can achieve application, management and monitoring of database data without going to the site personally. According to the invention, the ant colony algorithm is adopted; according to the characteristics of data communication and the requirements of interaction equipment, the optimization search of the encryption algorithm is carried out among the plurality of encryption units, so that a user can quickly find out the optimal value of the target data suitable for applicationfrom the plurality of encryption algorithms, and the efficiency and the data management capability of the encryption unit application algorithm are greatly improved.
Owner:重庆知翔科技有限公司

Color image encryption method based on three-dimensional Logistic mapping and generalized Cat mapping

The invention provides a color image encryption method based on three-dimensional Logistic mapping and generalized Cat mapping, which comprises the following steps: reading an original color image toobtain two-dimensional pixel matrixes corresponding to R, G and B components, and straightening the two-dimensional pixel matrixes to obtain three pixel sequences; three groups of chaotic sequences are generated through three-dimensional Logistic mapping iteration, and subjecting the three groups of chaotic sequences and the three pixel sequences to XOR operation to realize diffusion processing; carrying out data reconstruction on the chaotic sequence obtained after diffusion processing and expanding the chaotic sequence into a three-dimensional cube; performing position scrambling processingon the three-dimensional cube through generalized Cat mapping; and converting the three-dimensional cube with the scrambled position into a cuboid which is a ciphertext image. According to the method,parameters and initial values of three-dimensional Logistic mapping and generalized Cat mapping and the plaintext image size are used as keys, the key space is increased. Encryption safety is improved, and the method has the advantages of being high in key sensitivity, high in anti-attack capability and the like.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Selective Data Encryption and Decryption Method and Apparatus

This present application relates to the field of data encryption and decryption technology, and in particular, relates to a selective data encryption and decryption method and apparatus. The encryption method includes: generating a string of true random numbers 0, 1 of a predetermined length via the preset method as a random seed; acquiring data for several times from the random seed, and cascading the data acquired each time into a random string no shorter than the length of a plaintext; according to the random string, generating a plaintext encryption bit identifier random string; randomly selecting more than one half of plaintext data for encryption according to the plaintext encryption bit identifier random string; arranging the encrypted data and unencrypted data to form a ciphertext according to their positions of the plaintext. The encryption apparatus includes: true random number generation module, encryption bit identifier random string generation module, plaintext selectivity encryption module and ciphertext formation module. This application also provides a selective data decryption method and apparatus. This invention reduces the amount of data to be encrypted or decrypted, thus improves the data encryption and decryption performance.
Owner:BEIJING Z & W TECH CONSULTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products