Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

367results about How to "Improve encryption efficiency" patented technology

Encryption and decryption method for numeric type data

The invention discloses an encryption and decryption method for numeric type data. The method comprises the following steps that the numeric type data is converted into character strings; each character is sequentially converted into 4 bits according to the correspondence relationship between the numeric characters and the binary system, and a bit stream is formed; the number of 0 and 1 in the bit stream is counted, and an encryption secret key is obtained through calculation; the encryption secret key is utilized, a chaotic sequence with the pseudo-random property is generated by a chaotic system, in addition, chaotic signals are taken from the chaotic sequence and are sequenced in an ascending sequence, and the bit stream is scrambled according to the positions in accordance with the scrambling rule; the corresponding relationship between the four-digit binary coding mode and the visible ciphertext characters is utilized for converting the scrambled bit stream into the visible ciphertext character strings, and the ciphertext can be decrypted and recovered into the original data type data through adopting the similar method. According to the method provided by the invention, the corresponding table customization is adopted, the numeric type data is subjected to binary scrambling chaotic encryption processing, the safety and the feasibility of the data encryption are ensured, and in addition, the encryption efficiency is also greatly improved.
Owner:南通九盛软件有限公司

Methods and devices for encrypting and decrypting video file and mobile terminal

The invention discloses a method for encrypting a video file, a method for decrypting the video file, a device for encrypting the video file, a device for decrypting the video file, and a mobile terminal, and belongs to the field of mobile terminals. The method for encrypting the video file comprises the following steps of: acquiring the video file to be encrypted and a key; encrypting the video file to be encrypted by using the key to obtain an encrypted video file; acquiring a pre-scanned mobile terminal and partitions storing user data except hidden partitions in an extended memory on the mobile terminal; and determining a partition storing the video file to be encrypted in all the partitions, and moving the encrypted video file into a preset folder in the partition storing the video file to be encrypted. The method for decrypting the video file comprises the following steps of: acquiring a video file to be decrypted and the key; decrypting the video file to be decrypted by using the key to obtain a decrypted video file; and determining the storage position of the video file to be decrypted before encryption, and moving the decrypted video file to the storage position before encryption. The video file can be quickly encrypted.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Spatial domain and Fourier frequency domain double encryption-based dual image encryption method

The invention discloses a spatial domain and Fourier frequency domain double encryption-based dual image encryption method. The method comprises the following two major steps: 1, encrypting, i.e., encrypting two normalized original images in spatial domain by using a random amplitude plate generated by a computer to obtain an encrypted result, i.e., complex amplitude, and encrypting the encrypted result in frequency domain by using a random phase plate generated by the random amplitude plate; 2, decrypting, i.e., recovering the random amplitude plate and the image obtained by encryption in spatial domain by using two private keys, and decrypting in spatial domain by using the random amplitude plate to obtain a decryption result, i.e., two original images. The method is used for encrypting and decrypting images; only the random amplitude plate is used for encrypting the images in spatial domain and frequency domain during decryption, and simultaneous encryption of a plain text and encryption key information is realized; the double encryption in spatial domain and frequency domain is adopted in the image encryption method, and two private keys are generated during the encryption, so that the safety of the system is high.
Owner:JIAXING NIYA OPTOELECTRONICS CO LTD

Hyper-spectral image compression and encryption method

InactiveCN103281534AReduce the amount of encrypted dataImprove transmission efficiencyTelevision systemsComputer hardwarePlaintext
The invention provides a hyper-spectral image compression and encryption method. The method comprises the following steps of performing coding in a wavelet transform three-dimensional set partitioning in hierarchical trees (3DSPIHT) coding way, simultaneously performing encryption, constructing a scrambling table in a Logistic mapping way to scramble an initial list of insignificant pixels (LIP), continuously iterating a Chen's model until all bits of data of significant types are encrypted, and in a decryption process which is the inverse operation of encryption, continuously updating an initial value of the Chen's model to decrypt the data of the significant types to make the decrypted data gradually approximate to an original image and finally reproduce the original image. According to the method, forward dependence of a 3DSPIHT coding method is utilized, and the data of the significant types is selectively encrypted in real time in a compression process, so that the encrypted data volume of the image is reduced, and the image transmission and encryption efficiency is improved; and the encrypted data volume of each significant type in a bit plane is calculated, and an initial key is scrambled after preprocessing, so that the sensitivity of the coding method to a plaintext is improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Implementation method for specific security terminal system based on iOS system

The invention provides an implementation method for a specific security terminal system based on an iOS system, which is suitable for WiFi/3G/4G networks and comprises eight modules including an iOS user registration module, an iOS calling module, a client voice processing module, a request processing module, a parallel processing module, a user management module, a server side call processing module and a server side voice encryption and decryption module, wherein a client of the specific security terminal firstly registers with a server and initiates a call based on a client-server (C-S) framework, the server carries out authentication on identity of the client, and after the authentication is successful, the server carries out corresponding encryption and decryption processing on call voice through identifying whether a calling party and a called party establish different call modes for the security terminal, so that the voice encryption transmission from the specific security terminal to the server side is guaranteed. The invention provides an efficient and convenient method, and the method only encrypts one side with the security requirement, so that the call efficiency and the practicability are improved.
Owner:东南大学常州研究院 +1

Double color image encryption method based on DNA sequence operation and deformed coupled map lattices

The invention discloses a double color image encryption method based on DNA sequence operation and deformed coupled map lattices. The method comprises: utilizing a secret key and two color plaintext images to generate parameters and initial values of iterating the deformed coupled map lattices, and generating secret key streams of L1, L2, K1 and K2 and random numbers of d1, d2 and d3 through iteration; separating red, green and blue trichromatic components of the plaintext images, transforming the components into binary matrices, and recombining the six binary matrices to obtain recombination matrices of A and B, utilizing the secret key streams of L1 and L2 to carry out bit-level scrambling on the matrices of A and B, and dividing the same into six binary matrices; utilizing a DNA encoding rule and combining the random numbers of d1, d2 and d3 to transform the binary matrices into DNA matrices, and executing DNA addition, subtraction and exclusive OR operations; and utilizing a DNA decoding rule to transform the DNA matrix into decimal matrices, utilizing the secret key streams of K1 and K2 and the bitwise exclusive OR operation to change values of image pixels, and obtaining ciphertext images of C1 and C2. The method can encrypt the two plaintext images at the same time, and has the advantages of high security, good encryption effect, no information loss, fast encryption speed and the like.
Owner:HENAN UNIVERSITY

Image encryption and decryption method based on probability interval division and dynamic probability events

The invention provides an image encryption and decryption method based on probability interval division and dynamic probability events. The method comprises steps of during encryption, firstly mapping secret key parameters and SHA-1 values of to-be-encrypted images to different probability encryption sections; carrying out random screening on to-be-encrypted pixels based on the secret key parameters and the SHA-1 values; and executing and writing different probability encryption events into corresponding pixel positions according to the probability sections where the probability encryption events fall. In order to improve safety, an SHA-1 value remapping process is added for dividing the probability sections, screening the to-be-encrypted pixels and carrying out stochastic disturbance on encryption; and by adding an overall situation encryption process related to SHA-1 update values and user secret keys, performance of an image encryption algorithm is enhanced. The method also comprises steps of during decryption, firstly recovering encrypted parameters; then finishing overall decryption; and at last executing inverse decryption operation on randomly screened pixels. Compared with the prior art, different pixels and secret keys correspond to different encryption processes, so the method is highly safe.
Owner:SHAANXI NORMAL UNIV

Virtual machine dynamic migration security protection method

InactiveCN106095525AEnables fine-grained processingFlexible security protectionProgram initiation/switchingSoftware simulation/interpretation/emulationData informationConfidentiality
The invention discloses a virtual machine dynamic migration security protection method. The virtual machine dynamic migration security protection method comprises the following steps of adding a security level division module and an encryption module based on a traditional migration mechanism, performing level division and marking on information of an emigrated virtual machine by the security level division module, enabling a marked memory page to enter the encryption module, and performing encryption of a corresponding level on data by utilizing an encryption algorithm; and at an immigrated host end, performing decryption on the encrypted data to recover the virtual machine. The method has the following beneficial effects: 1) the virtual machine information is subjected to the level division, so that fine-granularity processing of data information is realized and the security protection is more flexible; 2) different encryption algorithms are adopted according to different importance degrees of the information, so that the encryption efficiency is improved while the data security is ensured; and 3) the encryption algorithm and the confidentiality level can be dynamically updated, so that the system migration security is improved.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Color image encryption method based on Latin square scrambling

The invention relates to a color image encryption method based on Latin square scrambling. Plaintext keys r1, g1 and b1 are calculated through utilization of R, G and B components of a color plaintextimage, an initial value and a parameter obtained through calculation based on the keys are substituted into a chaotic system, and three groups of chaotic sequences are generated; the chaotic sequences for scrambling and diffusion are selected through utilization of a chaotic sequence selection mechanism based on the plaintext and digital arrangement; and a final ciphertext image is obtained through adoption of a block scrambling policy based on a Latin square and the chaotic sequences, and diffusion operation based on the plaintext and a scrambled image. The encryption method is closely related to the plaintext, so the plaintext attack resistance is improved. The employed chaotic system is an improved chaotic system, a chaotic characteristic is good, the randomness is high and a key spaceis great, so a security level is further improved. A simulation result and safety analysis show that according to the encryption provided by the invention, an image complete encryption demand can besatisfied, the encryption efficiency is high, and the robustness is high.
Owner:HENAN UNIVERSITY

Searchable public key encryption method, system employing method and server

The invention relates to a searchable public key encryption method, a system employing the method and a server. The method comprises the following steps that bilinear mapping is established accordingto a preset security parameter, and a public parameter PK and a private key SK are output; a sender initializes a searchable ciphertext structure according to the public parameter PK, and outputs a public part Pub of the structure and a private part Pri of the structure; the sender inputs a keyword W, the public parameter PK and the private part Pri of the structure, generates a corresponding searchable ciphertext for the keyword W through utilization of an encryption algorithm, and uploads the searchable ciphertext to the server; a receiver inputs the keyword W and the private key SK, outputsa search trap door TW and submits the search trap door TW to the server; and the server inputs the search trap door TW, the public parameter PK and a searchable ciphertext set composed of a pluralityof searchable ciphertext, performs a search algorithm, finds the searchable ciphertext corresponding to the keyword W generated through one-time bilinear mapping operation based on a first encryptionalgorithm, and finds other searchable ciphertexts based on an implication relationship.
Owner:HUAZHONG UNIV OF SCI & TECH

Multiple-image encryption method based on DNA coding and chaos

The invention discloses a multiple-image encryption method based on DNA coding and chaos, belonging to the field of information encryption. The massive digital image produced in the large data age should not only ensure the security of the image content, but also have high encryption efficiency. As a new multimedia security technology, the multiple-image encryption has the characteristic of high efficiency. A number of multiple-image encryption methods in the prior art have low encryption efficiency, weak security and obvious distortion in decrypted images, which are difficult to satisfy. Themultiple-image encryption method based on the DNA coding and the chaos comprises the following steps: encoding a number of original images into corresponding DNA sequence matrices; disordering the DNAsequence matrices by means of the chaos sequence; performing the DNA sequence diffusion operation on the disordered results; and obtaining the encrypted image by the DNA decoding operation. The maininnovation is that the invention provides a multiple-image encryption method based on the DNA coding and the chaos. The experimental results show that the method has excellent encryption effect and high security, and is suitable for the practical application of image encryption.
Owner:CHINA UNIV OF MINING & TECH

Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal

The invention discloses an encryption method, an encryption apparatus, a decryption method, a decryption apparatus and a terminal. The encryption method comprises: using a first secret key cipher text as a secret key of a first symmetric encryption algorithm so as to encrypt a clear text by the first symmetric encryption algorithm to obtain a cipher text; acquiring an informative abstract of the clear text, using the informative abstract as an original text of a signature algorithm, and using a second secret key cipher text as a secret key of the signature algorithm so as to generate a digital signature by the signature algorithm; packaging the first secret key cipher text, the second secret key cipher text and the digital signature to form an original text of an asymmetric cryptographic algorithm, and using an acquired public key as a secret key of the asymmetric cryptographic algorithm so as to generate a secret key set by the asymmetric cryptographic algorithm; and sending the cipher text and the secret key set to the terminal. According to the technical scheme of the invention, the encryption method, the encryption apparatus, the decryption method, the decryption apparatus and the terminal can be simultaneously guaranteed to have the characteristics of high encryption efficiency, small system resource occupation and encrypted data safety when data is encrypted.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products