Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

101results about How to "Improve encryption security" patented technology

Internet picture transparent and safe transmission method based on chaotic encryption

The present invention relates to an internet picture transparent and safe transmission method based on chaotic encryption, and provides a chaotic digital image encryption transmission solution scheme which supports the automatic generation of a secret key and is fully transparent to the internet user operation. According to the internet picture transparent and safe transmission method based on the chaotic encryption, a browser client utilizes a JavaScript program to automatically map, calculate and obtain two key Logistic chaotic secret key parameters according to the information, such as the usernames, password Hash values, etc. inputted by the internet valid users, to realize the safe and transparent encryption and transmission on the to-be-uploaded pictures of users; a server terminal can query a user database according to the registered username to obtain the password Hash value of a user, so that a same chaotic random sequence can be obtained, and finally the encrypted pictures uploaded by the user can be decrypted; on the contrary, when the user registers validly to require the server pictures, the JavaScript program can automatically carry out the chaotic secret key parameter calculation and chaotic decryption operations at a browser terminal. According to the scheme of the present invention, the balance problem among the security, the encryption efficiency, the secret key management and the like of the internet picture transmission can be solved effectively.
Owner:ZHEJIANG UNIV OF TECH

Encryption domain H.264/AVC video reversible data hiding method

The invention discloses an encryption domain H.264/AVC video reversible data hiding method. Under the premise that the encryption domain H.264/AVC video reversible data hiding method is compatible with an H.264/AVC video compressed encoding standard, code words of prediction modes, Exp-Golomb code words of motion vector difference and sign bits of residual error coefficients are selected to be encrypted, computation complexity is low, the application demands of real-time videos are met, and encryption safety is high. Meanwhile, influences of encryption on the code rate of code streams of H.264/AVC videos are quite small, and the problem of data expansion in the video encryption process is solved. A data hiding person can embed private information in the H.264/AVC videos of an encryption domain directly, and thus the problems of video content safety and privacy disclosure can be solved effectively. The hidden data can be extracted effectively from the encryption domain and can also be extracted effectively from a decryption domain, namely, data extraction and data decryption are separated completely, and practicality is high. In addition, the encryption domain H.264/AVC video reversible data hiding method is completely revisable, and original videos can be restored without damage after the hidden information is decrypted and extracted.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Chaos synchronization encrypting/decrypting method and device using data compression encoding

The invention discloses a chaos synchronization encrypting/decrypting method and device using data compression encoding. The device comprises a random number generator, a public key cryptography encipher, a public key cryptography decipher, a dynamical probability counter, an entropy encoder and an entropy decoder. The method comprises the steps of taking the entropy encoder and the dynamical probability counter used for the data compression as a chaotic dynamics system; enabling a compression coding process to form a chaotic cryptology encryption process; combining the public key cryptography encipher with the chaotic dynamics system, wherein after a randomly generated session key is encrypted in an asymmetrical encryption manner by a sender, the session key is sent to a receiver; initializing the respective chaotic dynamics system through the respective session key the sender and the receiver so that the system states of the sender and the receiver are synchronous; carrying out data compression encoding through the initialized system by the sender; and carrying out data uncompressing through a system with consistent state by the receiver. The method and the device provided by the invention support overlong session key and improve the encryption safety; and simultaneously, the encryption speed is not affected by the key length.
Owner:SOUTH CHINA UNIV OF TECH

Method and apparatus for encrypting information, computer device, and storage medium

InactiveCN107666479ASafe and reliable cloud transmissionSafe and reliable storageTransmissionCiphertextDocumentation
The invention relates to a method for encrypting information. The method comprises the following steps that: when an application program in a mobile terminal is monitored to be switched in an on state, a secret key character string is generated randomly and the generated secret key character string is stored; when the application program sends a communication request to a server for the first time, the generated secret key character string is encrypted asymmetrically by using a server public key published by the server in advance and the encrypted secret key character string is sent to the server; a document uploading request triggered by a user in the application program interface is obtained; a document carried by the document uploading request is analyzed, a privacy field in the document is localized, and the privacy filed is encrypted symmetrically by using a secret key character string generated randomly to generate a document ciphertext; and the generated document ciphertext is uploaded to the server, so that the server decrypts the uploaded document ciphertext based on the received encrypted secret key character string and a server private key. With the method provided by the invention, the information decryption and encryption processing efficiency is increased and the safety is enhanced.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Multivariable public key encryption method

The invention discloses a multivariable public key encryption method. According to the multivariable public key encryption method, when a key is generated, a matrix is constructed according to an iterative method, the length of the key is greatly reduced, and the key can be managed conveniently; a probability encryption method is adopted, random parameters are introduced into encryption, the random parameters must be solved by a deciphering party through a deciphering process, the random parameters take part in decryption of a plaintext, the plaintext can be deciphered only under the condition that the random parameters are known, the difficulty of ciphertext decryption by an attacker is increased, ciphertexts are different even if public keys are the same, the public keys can be released in the forms such as telephone numbers, and encryption security is improved; based on the combinatorial optimization difficulty and multivariable quadratic polynomial, attack of a quantum computer can be resisted, both the encryption speed and the decryption speed are high, and the method can be applied to mobile terminals such as mobile phones; based on calculation on a finite field, the calculation process is simplified; the addition homomorphism and the subtraction homomorphism are achieved, the multiplication homomorphism can be achieved under special conditions, and the method can be applied to the newly-developed fields such as cloud computing.
Owner:HUAZHONG UNIV OF SCI & TECH

High security character string symmetrical encryption and decryption method

The invention relates to a high security character string symmetrical encryption and decryption method. The encryption method comprises the steps of receiving a to-be-encrypted character string, an encryption vector and encryption offset; generating an encryption dynamic factor according to the encryption vector, and splitting the to-be-encrypted character string, thereby obtaining two sections ofsplit character strings; and generating a time encryption factor according to current time, adding the time encryption factor to the two sections of split character strings, combining the split character strings, and encrypting the combined character string according to the encryption offset, thereby obtaining the encrypted character string. The decryption method is reverse operation of the encryption method. Difference is calculated through utilization of a current time decryption factor and the time encryption factor extracted after the split is carried out. Decryption is carried out if a difference value does not exceed a threshold. Decryption failure is returned if the difference value exceeds the threshold. Compared with the prior art, the methods have the advantages that the security performance is high, the exhaustion break is prevented, and the break difficulty is high.
Owner:上海高顿教育科技有限公司

Keyboard input encryption method and mobile terminal thereof

The invention discloses a keyboard input encryption method and terminal equipment thereof. The mobile terminal comprises an encryption setting module, a resetting encryption setting module, an encryption input module and a central processing unit. The method comprises the following steps of: (a) detecting whether a user presses a functional key, and if the user presses the functional key, executing the next step, otherwise, ending the detection; (b) judging a mode of the current user input keyboard by a system, if the mode is a common mode, directly outputting a typed functional key value through a keyboard, and if the mode is an encryption input mode, executing the next step; (c) judging whether the typed functional key value is exchanged with a key value of another functional key during encryption, if so, executing the next step, otherwise, directly outputting the functional key value; and (d) outputting the exchanged key value, and returning to the step (a). Aiming at a situation that a user uses mobile phone application to input sensitive information under a complicated environment, the encryption security of an input method is realized; a phenomenon that sensitive information acquired by the user is pried is avoided; fund loss of the user is prevented; and therefore, the user can securely execute relevant operation with a mobile phone, and the security of the mobile phone is also improved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Encrypted embedded video chaotic secret communication method after H.264 coding

The invention discloses an encrypted embedded video chaotic secret communication method after H.264 coding. The encrypted embedded video chaotic secret communication method comprises the following steps of S1, at a transmitting end, performing H.264 hardware coding, chaotic flow password encryption, pixel-position chaotic scrambling encryption, network transmission and wide-area network transmission on video data; and S2, at a receiving end, receiving encrypted video data through the network, finishing pixel-position chaotic descrambling decryption and chaotic flow cipher decryption, realizing H.264 hardware decoding on the condition that a password matches, and stopping communication between the transmitting end and the receiving end after H.264 hardware decoding failure on the condition that password mismatching occurs. The encrypted embedded video chaotic secret communication method has double encryptions, namely chaotic flow password encryption and chaotic position scrambling encryption. The double encryptions are performed after H.264 coding compression. The encrypted embedded video chaotic secret communication method has advantages of realizing no damage of original video correlation, improving coding efficiency, reducing data redundancy, and realizing high real-time performance and high safety of an encryption system.
Owner:GUANGDONG UNIV OF TECH

Metasurface structure design method realizing multi-dimensional optically manipulative image transformation

InactiveCN110133758AImplement image transformation operationsAvoid crosstalkPolarising elementsLength waveMulti dimensional
The present invention relates to the technical field of optical devices based on an artificial metasurface structure, more specifically, the invention relates to a metasurface structure design methodrealizing multi-dimensional optically manipulative image transformation. A metasurface structure composed of structural units is constructed on a transparent substrate; pixels of the metasurface structure are formed by the coherent interference among the structural units; a Jones matrix J is obtained for the structural unit with a rotation angle of phi; according to the incident light acting on the structural unit, a scattering factor of the incident light is obtained on the basis of the Jones matrix J of the structural unit; considering the pixels composed of the n structural units, when theincident light is incident on the transparent substrate at the incident angle theta, the wavelength lambda and the polarization state sigma, the intensity of the pixels of the metasurface is formed bythe coherent interference of all the structural units; and the multi-dimensional optically manipulative image transformation function of the metasurface structure is realized. The invention can realize the image transformation with any multi-dimensional optical parameters and solves the image crosstalk problem.
Owner:SUN YAT SEN UNIV

Voice communication information source encryption system for mobile terminal

The invention discloses a voice communication information source encryption system for a mobile terminal, comprising an analog-digital converter and a data encryption and decryption and phonological modem, wherein the analog-digital converter is used for converting an audio analog signal generated by a voice collector into voice data, or used for converting the audio data undergoing phonological encoding into an audio analog signal; the data encryption and decryption and phonological modem comprises a voice digital coding and decoding module, a security kernel module and a phonological modulation and demodulation module, wherein the voice digital coding and decoding module is used for performing digital voice compression on the converted audio data, the security kernel module is used for performing digital hardware encryption on the audio data subjected to digital voice compression, and the phonological modulation and demodulation module is used for performing phonological encoding onthe audio data subjected to digital hardware encryption. According to the invention, under the condition of not changing the voice communication procedure of the existing mobile terminal, voice communication information source encryption of the mobile terminal is realized, the encryption security is high, and the applicability is wide.
Owner:河南芯盾网安科技发展有限公司

Medical image file segmentation encryption and decryption system and method based on greenplum

The invention discloses a medical image file segmentation encryption and decryption system and method based on greenplum and relates to the technical field of computers. The medical image file segmentation encryption and decryption system comprises an encryption and decryption server used for encrypting or decrypting a received medical image file; a rule base used for storing a secret key generation rule and a segmentation ID generation rule; a key generation server used for generating a key and a segment ID according to metadata information given by the encryption and decryption server and the key generation rule and the segment ID generation rule obtained from the rule base and returning the key and the segment ID to the encryption and decryption server; a greenplum distributed databasecluster used for storing the generated secret key and the segment ID. According to the invention, sensitive information in the medical image file is encrypted in a segmented manner by utilizing a datasegmented encryption means based on the segmented ID, and only the sensitive information in the medical image file is encrypted instead of the whole file, so that the encryption and decryption efficiency can be improved, and meanwhile, the encryption security of the medical image file and the reliability of key storage are improved.
Owner:中电健康云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products