Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

55results about How to "Improve negotiation efficiency" patented technology

Quadratic congruence equation-based method for resisting denial-of-service attacks of wireless network

InactiveCN102196432AReduce the number of negotiationsIncrease the number of negotiationsAssess restrictionSecurity arrangementWireless mesh networkBeacon frame
The invention discloses a quadratic congruence equation-based method for resisting denial-of-service attacks of a wireless network, which belongs to the technical field of network safety, and mainly solves the problem that the DoS (Denial-of-Service) attacks exist in a wireless access authentication process of an IEEE (Institute of Electrical and Electronic Engineers) 802.11i protocol. The method is implemented by the following steps: an AP (Access Point) adds parameters used for constructing a puzzle into a beacon frame and broadcasts the beacon frame periodically by using the beacon frame in the IEEE 802.11i protocol; a client STA (Special Temporary Authority) acquires the beacon frame, extracts puzzle parameters from the beacon frame, constructs and solves the puzzle in combination with the current global parameters of the wireless network, adds the puzzle parameters and the solution into an authentication request message, and sends an authentication request message to the AP; and the AP receives an open system authentication message of the STA, and the AP sends the authentication request message to the STA to complete the association process when the solution of the puzzle is correct, or the request of the STA is terminated. When the method is adopted, the negotiation times increased to construct the puzzle in a traditional client puzzle scheme are reduced, and the negotiation efficiency and the DoS attach resistance of the wireless access authentication protocol are improved.
Owner:XIDIAN UNIV

Trust negotiation building method and system based on history roles

The invention discloses a trust negotiation building method based on history roles, which comprises the following steps that: (1) when a request party submits requests on a certain resource to a resource party, firstly, a chinchin stage of the trust negotiation is triggered, and the identities of the two parties and whether the historical negotiation success record information exists or not are verified; (2) after the chinchin stage is completed, the two parties enter a trust development period, a safe certificate disclosing sequence is found out to visit the requested resources through mutually disclosing visit control tactics and certificates; and (3) the two parties enter the trust maintenance stage after the trust negotiation is successful, relevant information of the other negotiation party in the current negotiation is stored for accelerating the subsequent negotiation process of the two parties. The method provided by the invention has the advantages that the successfully negotiated two parties update the roles for the other parties in self history information databases and record and obtain the certificate disclosing sequences of the two parties of the role. When the two parties negotiate again, the negotiation does not need to be carried out again, the disclosing can be directly carried out according to the certificate disclosing sequences of the role, the subsequent negotiation of the two parties is shortened, and the certificate collection activities of venomous negotiation adversaries is avoided.
Owner:HUAZHONG UNIV OF SCI & TECH

Management method and system of electric power Internet-of-Things terminal layer equipment secret key and storage medium

The invention discloses a management method and system for an electric power Internet-of-Things terminal layer equipment secret key and a storage medium. The method comprises the following steps: initializing a secret key; using the terminal layer equipment as a node for initialization, and completing regional key initialization; generating a key pool; randomly numbering all nodes in the region, and randomly sorting the numbers by adopting a Hamilton algorithm; according to the random sorting of the node numbers in the region, selecting the sub-keys of the corresponding nodes to construct a complete region key, and collecting all the region keys to obtain a key pool; key negotiation; before the two nodes carry out encrypted data communication, randomly selecting sub-keys of the corresponding nodes from the key pool, carrying out mutual verification on the sub-keys of the two communication parties, and after identity information in the sub-keys is verified to be correct, calculating a session key through key parameters; and performing session key negotiation based on the session key, if the negotiation succeeds, sending a communication identifier by the two parties, opening the session, and starting data communication encrypted by the session key.
Owner:CHINA ELECTRIC POWER RES INST +2

Error code negotiation method and device for discrete quantum key distribution system

The invention provides an error code negotiation method and device for a discrete quantum key distribution system for simultaneously improving the processing rate and the negotiation efficiency, and belongs to the technical field of quantum communication. The method comprises the following steps: performing scrambling processing on a data block D; performing random sampling on scrambled data to obtain sampled data Ds; correcting and decoding the sampled data Ds by using an interactive negotiation algorithm, obtaining an estimated error rate by using the relationship between the first round ofparity bits and the error rate, and executing an initialization work via a forward error correction negotiation algorithm when the interactive negotiation algorithm waits for the interaction information in the first round; performing, by the forward error correction negotiation algorithm, adjustment based on the estimated error rate, completing, by the interactive negotiation algorithm, the remaining multi-round error correction decoding work of the sampled data, and decoding, by the forward error correction negotiation algorithm, the remaining data after sampling in each round of waiting forthe interaction information; and splicing the decoding results of the interactive negotiation algorithm and the forward error correction negotiation algorithm according to the orders before the scrambling.
Owner:HARBIN INST OF TECH +1

Industrial internet data encryption transmission method based on stream cipher

The invention discloses an industrial internet data encryption transmission method based on a stream cipher, which is used for realizing data encryption transmission between a sender and a receiver in an industrial internet. The method comprises the following steps: a sender sends data to be sent to an encryption gateway; the encryption gateway generates a unique identifier, calculates a stream key index used for encrypting current data based on the identifier, extracts a stream key from a stream key sequence according to the stream key index, encrypts the current data by using the stream key, and then sends the identifier and ciphertext data to a decryption gateway of a receiver together; and the decryption gateway firstly extracts data identification information, then calculates a stream key index for decrypting the current ciphertext based on the identification, extracts a stream key from a stream key sequence according to the stream key index, decrypts the current ciphertext by using the stream key, and finally sends the obtained plaintext data to a receiver. According to the data encryption transmission method, correct transmission of the data can be ensured, the calculation amount of encryption and decryption is reduced, and the data transmission efficiency is improved.
Owner:北京北卡星科技有限公司

Flight management system and method thereof based on multi-task parallel processing

The invention relates to flight management system and method thereof based on multi-task parallel processing. The system comprises an electronic flight instrument system display unit, a multifunctional control display unit, a flight management system processing unit and a display unit with a control button, wherein the multifunctional control display unit is used for maintaining existing functions of formulating and executing a flight plan; and the flight management system processing unit is connected with the multifunction control display unit and used for copying the formulated flight plan and carrying out assessment and dynamic modification on the flight plan. The invention converts the traditional signal processing scheme into a parallel processing scheme: one processing scheme is used for maintaining the traditional functions of formulating and executing the flight plan, and the other processing scheme is used for providing the dynamic modification and assessment functions; and flight personnel can effectively prepare and scientifically assess the change basis by dynamically modifying an assessment scheme, therefore, the invention can satisfy the changeful practical needs andimprove the flight safety and the flight operation effectiveness.
Owner:CHINESE AERONAUTICAL RADIO ELECTRONICS RES INST

A key online negotiation method and system suitable for the communication environment of the Internet of Things

An online key negotiation method and system suitable for the communication environment of the Internet of Things. The server monitors the connection request of the client through the registration port, and the client is preset with the digital certificate of the server; the server with a clear identity receives the client The information structure sent, the information structure contains the identity information of the client and the channel connection negotiation information; when the server receives the information structure, the server uses the preset client digital certificate or registered client ID to confirm the identity of the client ; The server feeds back the confirmation channel connection negotiation information to the client, and when the channel connection negotiation information fed back by the server is received by the client, a secure communication channel between the client and the server is established. The invention cancels the transmission of extended information; directly specifies the algorithm, no algorithm negotiation is performed; the content of the certificate is no longer transmitted, the number of communications in the handshake stage of the TLS protocol is reduced, and the negotiation efficiency of the encryption key in the communication of the Internet of Things is improved.
Owner:江南信安(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products