Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

75results about How to "Improve encryption and decryption efficiency" patented technology

Data transmission method, device and system

The invention provides a data transmission method, a data transmission device and a data transmission system. The method comprises the steps of generating an asymmetrical secret key pair including a first public key and a first private key, and sending a data request carrying the first public key to a server side; receiving a ciphertext and a second public key sent by the server side, wherein the second public key is the public key in the asymmetrical secret key pair acquired by the server side, the asymmetrical secret key pair acquired by the server side also comprises a second private key, the ciphertext is information generated by encrypting a seed parameter used for generating an offline payment code by using a sharing secret key, and the sharing secret key is the secret key by using a preset secret key negotiation algorithm according to the second private key and the first public key; and generating the sharing secret key by using the secret key negotiation algorithm according to the first private key and the second public key, using the sharing secret key to decrypt the ciphertext, thus acquiring the seed parameter. According to the method, the device and the system provided by the invention, security of the data during a whole transmission process is ensured, and decryption and encryption efficiency is also improved.
Owner:ADVANCED NEW TECH CO LTD

Realization system and method for safely visiting and storing intranet data by mobile equipment

The invention discloses a realization system and a method for safely visiting and storing intranet data by mobile equipment. The method comprises the following steps: judging whether the mobile equipment is registered or not by a security management platform; carrying out mutual authentication on the registered mobile equipment; allowing the accession to the intranet after the authentication success; rejecting the accession to the intranet of unregistered mobile equipment and authentication failed mobile equipment; invoking an encryption module when a monitoring module discovers that the mobile equipment is about to store the intranet data in the intranet into the mobile equipment per se; selecting corresponding encryption methods by the encryption module under the monitoring of the monitoring module according to the confidentiality levels of the intranet data for encrypting the intranet data to be stored into the mobile equipment; and inquiring whether the encryption data is confidentiality data or not by a decryption module to the monitoring module in the intranet when the encryption data stored in the mobile equipment needs to be decrypted, and then, selecting corresponding methods for decrypting the encryption data. The invention implements different encryption and decryption methods according to different confidentiality levels, improves the encryption and decryption efficiency and data confidentiality, integrally utilizes the mutual authentication method and the encryption and decryption method, and improves the security of the intranet data.
Owner:JINAN UNIVERSITY

Data encryption and decryption method and device

The invention discloses a data encryption method and device and a data decryption method and device, and aims to solve the problems that a static secret key and an encryption algorithm in an existingdata encryption method are single, fixed for a long time and easy to crack. The method comprises the following steps: enabling a server to receive a secret key and algorithm allocation request sent bya first terminal, wherein the secret key and algorithm allocation request comprises a needed secret key level and an algorithm category; selecting a secret key, an encryption algorithm and a corresponding decryption algorithm from the established secret key database and algorithm database according to the required secret key level and algorithm category; sending the secret key identifier and thealgorithm identifier to the first terminal; receiving a data encryption request sent by a second terminal, wherein the data encryption request carries a secret key identifier and an algorithm identifier sent to the second terminal by the first terminal; extracting a secret key corresponding to the secret key identifier and an encryption algorithm corresponding to the algorithm identifier from thesecret key database and the algorithm database respectively; and enabling the second terminal to encrypt the data requested by the first terminal by using the secret key and the encryption algorithm.
Owner:CHINA MOBILE GROUP JILIN BRANCH +1

Circuit structure for preventing power attacks on grouping algorithm

The invention provides technology which can effectively resist to attacks on modules, chips, smart card bodies and the like adopting a grouping encryption and decryption algorithm through power analysis (simple power analysis (SPA) and difference power analysis (DPA)) or electromagnetic radiation analysis (DEMA) to obtain encryption and decryption operation secret keys and a circuit implementation structure of the technology. In application of a high-safety smart card, including but not limited to application areas such as electronic identification cards, debit cards and social security cards, the circuit structure can effectively protect the grouping encryption modules, the chips, the smart card bodies and the like and prevent the encryption and decryption operation secret keys from decoding and obtaining by the power analysis or the electromagnetic radiation analysis. The circuit structure can improve efficiency of encryption operation in continuous encryption operation, improves safety protection strength on the grouping encryption modules, the chips, the smart card bodies and the like, guarantees execution efficiency of the encryption operation, and has good innovation, practical applicability and effectiveness.
Owner:BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD

Program protection method and device

The embodiment of the invention discloses a program protection method and device. The method comprises the following steps of encryption at a program generation stage: acquiring a first secrete key; acquiring a second secrete key and a mark of a designated category; encrypting the designated category by utilizing the second secrete key; encrypting the attribute information of the second secrete key by utilizing a public key of the first secrete key; decryption at a program running stage: decrypting encrypted data of the attribute information of the second secrete key by utilizing a private key of the first secrete key; judging whether the to-be-loaded category belongs to the designated category or not according to the mark of the designated category, and decrypting the to-be-loaded category by utilizing the second secrete key if the to-be-loaded category belongs to the designated category. The first secrete key and the second secrete key are used for doubly encrypting the program, so that the source code of the program can be effectively protected; meanwhile, the program is also distinguished, and only the designated category is encrypted, so that the encryption and decryption efficiency can be improved; moreover, the mark of the encrypted category is further encrypted and protected by the second secrete key, so that the safety of the program is further protected.
Owner:BEIJING AUTONAVI YUNMAP TECH CO LTD

Power distribution network information secure transmission method based on quantum encryption

The invention discloses a power distribution network information secure transmission method based on quantum encryption. The method comprises the following steps: S1, establishing communication; s2, the edge server obtains the request information of the power distribution and utilization terminal, and generates a binary random number sequence L1 according to the occupation condition of the request information in the first-level information block A; s3, the master station server generates response information blocks according to the request information, and generates a binary random number sequence L2 according to the occupation condition of the first-level response information blocks; s4, the quantum encryption server generates a key pool Q, and configures a public key pool Puk and a private key pool Pri for the quantum key pool Q; s5, respectively collecting quantum keys by taking the binary random number sequences L1 and L2 as random numbers; s6, the edge server carries out encryption by using the obtained quantum secret key, and carries out decryption by using the obtained quantum secret key; and S7, the power distribution and utilization terminal obtains corresponding response information. According to the scheme, positioning encryption and decryption of parallel data are realized, and the encryption and decryption efficiency based on the quantum key is improved.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO

Symmetric encryption and decryption method, and symmetric encryption and decryption system

A symmetric encryption and decryption method and a symmetric encryption and decryption system are provided. The symmetric encryption and decryption method includes the following steps that: data to be processed, keys and first random numbers are provided; first computation and first linear computation are performed on the data to be processed, the keys and the first random numbers, such that first data are obtained; the first linear computation and second computation are performed on the first random numbers, such that second data are obtained; nonlinear computation is performed on the first data, such that third data are obtained; the first computation and second linear computation are performed on the third data and the second data, such that encryption and decryption data are obtained; the nonlinear computation includes the step that initial SBOX is provided; the second computation is performed on the first random numbers, such that fourth data can be obtained; the first computation is performed on the initial SBOX and the fourth data, such that fifth data can be obtained; the locations of elements in the fifth data are adjusted according to the first random numbers, such that new SBOX is obtained; and nonlinear byte data corresponding to the first data are selected from the new SBOX and are adopted as the third data. With the symmetric encryption and decryption method and the symmetric encryption and decryption system of the invention adopted, the security and efficiency of encryption and decryption can be improved.
Owner:SHANGHAI FUDAN MICROELECTRONICS GROUP

Data encryption and decryption method, device and system

The embodiment of the invention provides a data encryption and decryption method, device and system, and the method comprises the steps of determining a to-be-encrypted field in output data if the output data of an application on a client is obtained; encrypting a to-be-encrypted field in the output data to obtain a ciphertext of the to-be-encrypted field, and generating encrypted data of the output data according to the ciphertext of the to-be-encrypted field; if the input data of the application on the client is obtained, determining a to-be-decrypted field in the input data; sending a decryption request to a server, wherein the decryption request comprises a to-be-decrypted field; receiving a plaintext of a to-be-decrypted field returned by the server for the decryption request, and generating decryption data of the to-be-decrypted field according to the plaintext, wherein the plaintext of the to-be-decrypted field is obtained by the server according to the to-be-decrypted field query key value pair in the decryption request. According to the invention, sensitive information of data can be prevented from being leaked, the data security is ensured, the data encryption and decryption efficiency is improved, and the influence of data encryption and decryption on service processing is reduced.
Owner:TONGDUN HLDG CO LTD

Scheduling method for multiple processes to preempt hardware key encryption and decryption resources

The invention provides a scheduling method for multiple processes to preempt hardware key encryption and decryption resources, which comprises the following steps of: 1, starting a file encryption and decryption service, and automatically creating a performance state thread pool; 2, the hardware key waits for submission of encryption and decryption tasks, file encryption and decryption priorities are defined, and the encryption and decryption tasks are carried out according to the priorities; step 3, detecting whether there is a call or recording, pausing the encryption and decryption task, and continuing to submit the task; 4, releasing hardware key resources, and discarding a file which is being encrypted and decrypted; and step 5, after calling or video recording is completed, continuing the file encryption and decryption task. The method has the advantages that it is guaranteed that other tasks can be carried out in the file encryption and decryption process, the file encryption and decryption efficiency is improved, and normal operation of a system is guaranteed; a thread pool is created for a batch processing file encryption and decryption task, and hardware resources are allocated according to task priorities, so that on one hand, memory consumption is reduced, and on the other hand, system resource management is facilitated.
Owner:中易通科技股份有限公司

Streaming encryption method for text data reservation format

The invention provides a streaming encryption method and device for a text data reservation format. The method comprises the following steps: reading plaintext characters in text data; converting theplaintext character into a uniform code; judging whether a character set to which the plaintext character converted into the uniform code belongs is a filtered character set or not; if the character set is the filtering character set, directly outputting the current plaintext character; if the character set is a non-filtering character set, performing format-reserved obfuscation processing on thecharacters in the password table corresponding to the plaintext characters to obtain an updated password table; searching an encrypted character corresponding to the plaintext character in the updatedpassword table; and taking the plaintext character and the encrypted character which are directly output as final encrypted text data. According to the method, the filtering characters and the non-filtering characters are used, so that the plaintext characters are encrypted in a targeted manner, the consistency of character formats is controlled in a finer and richer manner. The method is more suitable for encryption on network transmission through one-by-one character encryption, and the encryption and decryption efficiency is improved.
Owner:车轮互联科技(上海)股份有限公司

Medical image file segmentation encryption and decryption system and method based on greenplum

The invention discloses a medical image file segmentation encryption and decryption system and method based on greenplum and relates to the technical field of computers. The medical image file segmentation encryption and decryption system comprises an encryption and decryption server used for encrypting or decrypting a received medical image file; a rule base used for storing a secret key generation rule and a segmentation ID generation rule; a key generation server used for generating a key and a segment ID according to metadata information given by the encryption and decryption server and the key generation rule and the segment ID generation rule obtained from the rule base and returning the key and the segment ID to the encryption and decryption server; a greenplum distributed databasecluster used for storing the generated secret key and the segment ID. According to the invention, sensitive information in the medical image file is encrypted in a segmented manner by utilizing a datasegmented encryption means based on the segmented ID, and only the sensitive information in the medical image file is encrypted instead of the whole file, so that the encryption and decryption efficiency can be improved, and meanwhile, the encryption security of the medical image file and the reliability of key storage are improved.
Owner:中电健康云科技有限公司

Interceptor-based data encryption method and apparatus, and computer equipment

The invention discloses an interceptor-based data encryption method and apparatus, computer equipment and a storage medium, and relates to the big data and blockchain technology. The method comprisesthe steps: obtaining personal verification information through a reflection mechanism if a first pre-compiled SQL statement is intercepted through a Mybatis interceptor; obtaining an initial master key and an initial working key which are randomly generated, and encrypting the personal verification information by using the initial working key to obtain encrypted personal verification information;storing the personal verification information into a current data table to obtain an updated data table; if a second pre-compiled SQL statement is intercepted through the Mybatis interceptor, obtaining a corresponding result set in the updated data table of the database; and decrypting to obtain a decrypted result set. According to the method, the personal verification information is automaticallyencrypted before entering the database and is automatically decrypted when coming out, so that the data security is improved, the encryption and decryption processes are fully automatically carried out, and the encryption and decryption efficiency is improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products