Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

228results about How to "Improve security strength" patented technology

Metering data transmission system based on identity encryption and data transmission method

The invention discloses a metering data transmission system based on identity encryption, which comprises a host station, a metering terminal and an intelligent electric energy meter, wherein the intelligent electric energy meter encrypts metering data by adopting a working key and sends the metering data to the metering terminal; the metering terminal performs decryption by adopting the working key of the intelligent electric energy meter, then encrypts the metering data to form a ciphertext by using a public key of the metering terminal, generates a signature for the ciphertext, and sends the metering data and ciphertext information to the host station together; the host station verifies the signature by using the public key of the metering terminal, a private key of the metering terminal is generated after the signature is authenticated, and decryption for ciphertext information is performed so as to obtain an information plaintext; the host station generates a control command according to data processing results and encrypts the control command by adopting system sharing parameters and the public key of the metering terminal so as to generate the ciphertext, the ciphertext is sent to the metering terminal after the signature is generated, the metering terminal verifies the signature and the signature is authenticated, and the control command aiming at the intelligent electric energy meter is generated after the private key is adopted to decode the ciphertext and the control command is read; and in addition, the control command aiming at the intelligent electric energy meter is encrypted through the working key of the intelligent electric energy meter and then is sent to the intelligent electric energy meter. The metering data transmission system improves the security for data transmission, and reduces the calculating load of the host station.
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID +1

Multi-protocol industrial communication safety gateway and communication method with gateway applied

The invention relates to a multi-protocol industrial communication safety gateway and a communication method with the gateway applied. In the data communication process, a source gateway encrypts data through a secret key management mechanism module and a VPN encryption and decryption module and then sends the data to a target gateway. The target gateway decrypts the data through the VPN encryption and decryption module, and provides safe detection and control service for data communication through a safety domain safety protection module; if the data are safe, secret key decryption is carried out on application layer data, the types of the application layer data are judged, an application management safety module is used for management if the application layer data are application management data, and an application layer message detecting and filtering module is called for detecting and filtering messages if the application layer data are application layer messages. The mode of combination of the VPN encryption and decryption, the secret key encryption and decryption, and the application layer message detecting and filtering is adopted for communication safety assurance; the safety domain safety protection and the application safety management are adopted for gateway application safety assurance.
Owner:山东华汉电子有限公司

Aircraft platform-based intelligent district safety protection system and intelligent district safety protection method

The invention discloses an aircraft platform-based intelligent district safety protection method, which comprises step: according to distribution of monitoring blind areas in the district, a monitoring center sets a patrol route of the aircraft; when the aircraft works in an automatic mode, the monitoring center controls the aircraft to fly via a base station, images of the district are monitored via a CCD camera of the aircraft along the set patrol route, and the images obtained through monitoring of the CCD camera are transmitted in real time to the monitoring center via the base station; the aircraft uses the equipped infrared camera thermal imaging principle and adopts the face recognition technology to judge whether a person exists in the patrol route, if yes, the aircraft stops in the air for a certain time and transmits an announcement instruction to the monitoring center via the base station, and if not, patrol operation is continued. Monitoring can be executed on places at which no one can arrive via the CCD camera, and the safety protection range is increased; and through the thermal imaging principle of the infrared camera and the face recognition technology, the district safety protection strength is enhanced.
Owner:HUAZHONG UNIV OF SCI & TECH

Motorcade safety management system and method based on ring signature and vehicle management platform

The invention belongs to the technical field of Internet of Vehicles, and discloses a motorcade safety management system and method based on ring signatures, and a vehicle management platform. identity-based ring signatures are performed on the identities of motorcade members on the basis of an elliptic curve. Hiding and public key updating are conducted on identities of motorcade members throughthe elliptic curve, the block chain and the ring signatures, the identities of the message senders are authenticated, and session keys are updated; the block chain is utilized to publish a public keycertificate and a reputation value of the vehicle; The vehicle inquires the public key, the public key validity and the current reputation value of the surrounding vehicles through the roadside unit,so that the addition of malicious vehicles is avoided; Updating of the public key can prevent information from being intercepted and tampered by malicious vehicles when the private key of the user issubjected to security threats. The privacy of registered users and the privacy of motorcade members are effectively prevented from being leaked, and the communication safety of the members in the motorcade is ensured.
Owner:XIAN UNIV OF POSTS & TELECOMM

Networked transaction certification system and method

The invention discloses a networked transaction certification system which comprises an encryption authentication device, a networked computing device and a transaction system device, wherein the encryption authentication device is connected with the transaction system device through the networked computing device, the networked computing device is used for receiving request transaction information submitted by a user, and transmitting the request transaction information to a transaction system device; the transaction system device is used for generating a random code according to the request transaction information, and searching an elliptic curve password public key corresponding to the user in a user database, and the transaction system device is also used for encrypting request transaction information and a random code by using the elliptic curve password public key, transmitting the encrypted ciphertext to the networked computing device, and storing the request transaction information and the random code into a transaction information database. The invention can realize confidentiality and integrity of a message, authenticity of a transaction entity and non-repudiation of transaction, and has the characteristics of high safety, capability of avoiding transaction hijacking, transaction falsification and remote control.
Owner:北京信安世纪科技股份有限公司 +1

Anti-leakage CP-ABE method under strategy hiding and outsourcing decryption

The invention discloses an anti-leakage CP-ABE (Ciphertext Policy-Attribute-Based Encryption) method under strategy hiding and outsourcing decryption. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption mainly realizes a CP-ABE scheme with three characteristics: leakage resistance, strategy hiding and outsourcing decryption, and belongs to the information safety field. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption utilizes a composite number order bilinear group to construct parameters, and adds the elements in a sub group Gp2 of the composite number order bilinear group in the main public key and the encryption algorithm to achieve the effect of hiding the access strategy. Besides, the algorithm decomposes the decryption process and adds an outsourcing decryption algorithm, and at the same time utilizes a double key system to enable the third party to be unable to completely decrypt the cryptograph, thus reducing the computing cost and guaranteeing safety of the user private key and the cryptograph. Compared with traditional anti-leakage scheme, the anti-leakage CP-ABE method under strategy hiding and outsourcing decryption has the advantages of leakage resistance, strategy hiding, outsourcing decryption, and higher safety, and greatly reduces the computing cost for decryption for the user.
Owner:NANJING UNIV OF POSTS & TELECOMM

Data security authentication method between cloud and edge node

The invention provides a data security authentication method between a cloud and an edge node, and the method provides a bidirectional identity authentication protocol between the edge node and the cloud, can guarantee the authenticity and effectiveness of the identities of the cloud and the edge node, prevents malicious attacks from permeating into a core network, and greatly guarantees the industrial Internet security. According to the method, an elliptic curve cryptographic algorithm is introduced to encrypt key data in an authentication process; the algorithm key size, the system parameters and the storage space are relatively small; operation speed is high, the highest safety intensity per bit is realized; the method is suitable for an authentication environment of edge computing nodes with limited computing resources and storage resources. According to the method, the data plaintext transmission leakage risk is avoided, the replay attack is avoided through the timestamp, the hashiterative operation of the one-time password authentication protocol is simplified, compared with the original authentication protocol, the security is higher, the operation efficiency is also improved, and the authentication security requirement can be met under the environment that the edge node resources are limited.
Owner:国家工业信息安全发展研究中心

Distribution network embedded telecontrol communication security gateway

The invention discloses a novel secure wireless data communication device, which realizes a remote distribution automation control function in a public network on the premise of ensuring the secure and effective transmission of distribution network data. A distribution network embedded telecontrol communication security gateway is classified into a calling distribution network embedded telecontrol communication security gateway and a called distribution network embedded telecontrol communication security gateway, and comprises a main board (1). A central processing unit (2), at least one read only memory (ROM) module (3), a FLASH module (4), a general packet radio service (GPRS) module (5), a hardware encryption module (6) comprising a digital certificate, a serial interface (7), a power interface (8), a subscriber identity module (SIM) card interface (9) and an antenna (10) are integrated on the main board. The gateway further comprises a management and configuration module, a network access module, an authentication module, a virtual private network (VPN) module, a firewall module and a network serial port conversion module. The gateway can be widely applied in the field of distribution network communication construction.
Owner:ZHUHAI POWER SUPPLY BUREAU GUANGDONG POWER GIRD CO +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products