Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

218results about How to "Improve transmission security" patented technology

Key management method and system

The embodiment of the invention discloses a key management method and system. The key management method includes the steps: if home terminal equipment detects that a user triggers the operation on opposite terminal equipment, the home terminal equipment sends a key application message to a key management server; according to the received key application message, the key management server generates a session key corresponding to an identifier of the home terminal equipment randomly, and sends the session key to the home terminal equipment; if the home terminal equipment receives the session key, the home terminal equipment sends a communication request to the opposite terminal equipment; according to the identifier of the home terminal equipment included in the communication request, the opposite terminal equipment requests the key management server to acquire the session key corresponding to the home terminal equipment; and if the opposite terminal equipment receives the session key, the opposite terminal equipment gives a response to the communication request and establishes communication connection with the home terminal equipment. The technical scheme of the key management method and system enables both the home terminal equipment and the opposite terminal equipment to safely acquire the session key of the communication of this time, thus improving generation safety and transmission safety for the session key, and guaranteeing safe transmission of the communication content.
Owner:SHENZHEN GIONEE COMM EQUIP

Method for obtaining root key and server

The embodiment of the invention discloses a method for obtaining a root key and a server. The method comprises the steps of obtaining a unique identifier of a security chip carried by root key obtaining request information, wherein the root key obtaining request information is sent by a terminal; encrypting the unique identifier through adoption of a first encryption key and sending the encrypted unique identifier to a service provider server corresponding to the security chip; receiving the encrypted root key returned by the service provider server; decrypting the encrypted root key through adoption of a first decryption key, thereby obtaining the root key corresponding to the unique identifier; encrypting the root key through adoption of a second encryption key and sending the encrypted root key to the terminal according to an identifier of the terminal carried by the root key obtaining request information; and decrypting the encrypted root key by the terminal through adoption of a second decryption key, thereby obtaining the root key. According to the embodiment of the invention, the risk of leaking the root key in a transmission process can be effectively reduced, the transmission security of the root key is improved, and the security of the information in the terminal is improved.
Owner:SHENZHEN GIONEE COMM EQUIP

Artificial noise assisted large-scale MIMO security statistical precoding method

The invention provides an artificial noise assisted large-scale MIMO security statistical precoding method. In the method, a cell base station is configured with a large-scale antenna array, and large-scale beam coverage is realized on the whole cell by utilizing a unified unitary transformation matrix. The base station uses beam domains of legal users and eavesdropping users in a cell to count channel information and injects artificial noise into the channel to reduce the decoding capability of the eavesdropping users, and performs statistical precoding design on the signals sent to each legal user and the artificial noise sent to the eavesdropping users according to the criterion of maximizing the system reachable traversal security and rate lower bound. In the moving process of each legal user and each eavesdropping user, the base station intermittently acquires statistical channel information and dynamically updates a statistical precoding result. According to the invention, the problem that the base station side only knows the design of the beam domain secure transmission signal of the statistical channel information is solved, the realization complexity is reduced, and meanwhile, the introduction of artificial noise improves the security of system transmission.
Owner:SOUTHEAST UNIV

Subway ticket checking terminal based on low-power-consumption bluetooth and two-dimensional code scanning

The invention provides a subway ticket checking terminal based on a low-power-consumption bluetooth and two-dimensional code scanning. The terminal is composed of a bluetooth module, a two-dimensional code scanning module, a central processing unit module, a storage module, a network module, an encryption and decryption module, and a serial port module. The bluetooth module is used for broadcasting a data packet with a low-power-consumption bluetooth 4.0 or above version; the two-dimensional code scanning module is used for scanning a two-dimensional code, wherein the code system of the two-dimensional code is PDF417; the encryption and decryption module is a PSAM card; and the serial port module is used for invoking an industrial personal computer device of external equipment to open a turnstile of the subway. According to the invention, on the basis of combination of the low-power-consumption bluetooth technology and two-dimensional code scanning, rapid ticket checking by the subway ticket checking terminal is realized; information transmission safety and stability are improved; the user experience degree is high; and the market prospect of popularization and application is broad.
Owner:GUANGXI MIFU NETWORK TECH

Method and device for cross-network safe transmission

InactiveCN103067405AAchieving a diffusion-proof connectionImprove securityTransmissionSecurity arrangementInternet communicationGraphics
The invention relates to a method and a device for cross-network safe transmission. The method comprises receiving data flow from a network Na and selecting a data packet with an expanded-name appointed; partitioning and organizing data according to content identification and order identification of the data packet; converting the data to a corresponding character string; converting the character string to a two-dimension code pattern and displaying the two-dimension code pattern on a display screen; scanning and receiving the two-dimension code by a scan head, analyzing the two-dimension code to be the corresponding character string, converting the character string into the data packet with the expanded-name, the content identification and the order identification and sending the data packet to a network Nb. According to the method and the device for the cross-network safe transmission, two sides offering communication adopt an anti-diffusion wireless-connected communicating method and adopt a self-defined communicating protocol to achieve interconnection and intercommunication of two independent networks instead of adopting a traditional public wireless network communication protocol, and therefore independence of the two communicating networks can be guaranteed completely , the shortage that the traditional network communication protocol is lack of safety is overcome and safety factors of internet communication are greatly increased.
Owner:SHENZHEN MAXVISION TECH

Quantum secret communication network system based on quantum key distribution technology, and application thereof

The invention discloses a quantum secret communication network system based on quantum key distribution technology, and an application thereof. The quantum secret communication network system physically comprises an access node, a switching node and a relay node, the nodes are respectively connected by using classic channels and quantum channels, wherein the classic channel for quantum key distribution performs communication in a non-IP mode; and the network system is logically divided into a quantum key distribution layer, a relay link layer, a network transmission layer, a service provisionlayer and a user application layer from bottom to top. The quantum secret communication network system disclosed by the invention overcomes the single point failure problem caused by a centralized routing server in the existing network; and the quantum secret communication network system disclosed by the invention communicates the classic channel for quantum key distribution in the non-IP mode, thereby effectively avoiding the network attacks for the TCP/IP technology, and the communication protection based on a quantum key is used as a basic function to further enhance the transmission security of the classic channel.
Owner:中共中央办公厅电子科技学院 +1

TMK (Terminal Master Key) secure downloading method and system

The invention discloses a TMK (Terminal Master Key) secure downloading method, which comprises the steps that 1) a hardware and security module generates a TK (Transmission Key), wherein the TK comprises an asymmetrical TEK (Transmission Encryption Key) and an asymmetric transmission AUK (Authentication Key), a public key Pu_tek of the TEK and a public key Pu_auk of the AUK are transmitted to a KMS (Key Management Service) system and a private key Pr_tek of the TEK and the private key Pr_auk of the AUK are injected into a POS (Point Of Sale) terminal through a secure method; 2) the POS terminal and the KMS system use the asymmetrical transmission AUK for bidirectional authentication; 3) if the AUK passes the authentication, the KMS system uses the Pu_tek to encrypt the TMK and transmits a master key ciphertext to the POS terminal; 4) the POS terminal uses the Pr_tek to decrypt the master key ciphertext Ctmk_tk to obtain a TMK. The TMK secure downloading method has the beneficial effects that the effect of remotely downloading the TMK by the POS terminal can be realized through the TK; since the TK comprises the asymmetric transmission AUK and the TEK, the transmission security of the TMK is effectively guaranteed.
Owner:FUJIAN LANDI COMML EQUIP CO LTD

Data transmission method, device and system

The embodiment of the invention discloses a data transmission method, device and system. The system comprises the steps that the device sends a communication connection request to a server so that the server can send a public key to the device after receiving the communication connection request, and the server stores at least one set of public key and secret key; if the device receives the public key sent by the server, the device generates symmetric secret keys according to the current communication connection request, and the symmetric secret keys are different when the communication connection requests are different; the device utilizes the public key for encrypting local information, and the local information includes the symmetric secret keys; the device sends the encrypted local information to the server so that the server can obtain the symmetric secret keys according to the local information matched with the public keys and obtained after the secret keys are decrypted and encrypted; the device uses the symmetric secret keys and the server for performing encryption communication till a current encryption communication channel is interrupted. According to the data transmission method, the dynamically-changing symmetric secret keys are provided, and the information transmission security is improved.
Owner:INVT ELEVATOR CONTROL TECH WUXI

User ID authentication method and system based on quantum network

InactiveCN101854347AProtect information securityImprove transmission efficiency and transmission securityUser identity/authority verificationAuthentication systemUser authentication
The invention provides a user ID authentication method and system based on a quantum network, which comprises the following steps that: an authentication center issues an ID authentication card; a user sends an authentication request; a quantum communication protocol creates shared data; the user summates the shared data and calculates the bit error rate, and the authentication center selects part of the summated shared data as a polarization mode after determining that the bit error rate belongs to a preset threshold range; the authentication center sends a pseudo selection code and a correction code; the user calculates a selection code according to the pseudo selection code and the correction code so as to obtain an ID authentication code; the users mutually authenticate or the user authenticates with the authentication center; and the authentication center backups the authentication result. The user ID authentication method can effectively protect the private information of the user, and has the advantages of safety and reliability. The invention also provides a user ID authentication system based on the quantum network, which similarly can effectively protect the private information of the user, and has the advantages of safety and reliability.
Owner:朱律波

Network information security intelligent analysis early warning management system based on multi-dimensional analysis

The invention discloses a network information security intelligent analysis early warning management system based on multi-dimensional analysis, and relates to the technical field of network information security. The problems that when a traditional network information security management system uses network transmission and data sharing as information storage and communication means, the system is lack of security protection, dangerous signals carried in transmission cannot be tracked in real time, and information updating is slow are solved. According to the network information security intelligent analysis and early warning management system based on multi-dimensional analysis, cross correlation and multi-angle combined analysis are performed on data in different dimensions through the supervision platform, high-level summarized data are refined and deepened into low-level detailed data, the accuracy of network information security analysis is greatly improved, and the network information security analysis efficiency is improved. Through a bottom layer driving filtering technology, various behavior operation requests are intercepted in real time, bad behaviors in data information operation are dynamically tracked, processed and detected, and a decision basis is provided for network management and optimization.
Owner:深圳市博博信息咨询有限公司

Tax-related data processing method and device, computer equipment and storage medium

ActiveCN110163735AImplement automated compliance checksEnable automatic compliance correctionsFinanceEnergy efficient computingData fileExtensible markup
The invention discloses a tax-related data processing method and device, computer equipment and a storage medium. The method comprises the following steps: receiving a tax-related data file sent by aclient; analyzing the tax-related data file to obtain a tax-related data record contained in the tax-related data file; carrying out normative checking on each tax-related data record, and correctingdata which do not conform to a preset text specification in each tax-related data record; acquiring a tax-related data record selected by a submitter from a client, and importing the selected tax-related data record into a preset extensible markup language file template to generate a submission file corresponding to the selected tax-related data record; performing structure verification on the reported file; and if the verification is passed, encrypting the submission file and sending the encrypted submission file to a preset submission platform. According to the technical scheme of the invention, automatic generation of the submission file and file structure verification are realized, and the submission processing efficiency and accuracy of the tax-related information and the transmissionsecurity are improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Method and system for binding vehicle to Internet of Vehicles account

The invention discloses a method for binding a vehicle to an Internet of Vehicles account, and the method comprises the steps that 100, a vehicle-mounted terminal obtains first vehicle inherent data through an in-vehicle network and sends the first vehicle inherent data to a background server in an encrypted mode; 200, the background server compares the data with data stored in an account databaseto determine whether a vehicle has a vehicle owner account or not: if the vehicle does not have the vehicle owner account, the background server sends the invitation to the vehicle-mounted terminal;300, after the vehicle-mounted terminal receives the invitation, the invitation is presented when the user uses the Internet of Vehicles service; 400, the vehicle-mounted terminal acquires second vehicle inherent data through an in-vehicle network and encrypts and sends the second vehicle inherent data to the background server; 500, the background server generates a character string based on the second vehicle inherent data, generates a QR code and sends the QR code to the vehicle-mounted terminal; 600, a mobile terminal vehicle factory APP is used for scanning the QR code, the APP analyzes the QR code to obtain a character string, and reports the character string and a logged-in account in the APP to the background server; 700, the background server compares the received character stringwith the character string in the step 500, and if the received character string is consistent with the character string in the step 500, the APP reported account is bound with corresponding vehicle information in a database.
Owner:SAIC VOLKSWAGEN AUTOMOTIVE CO LTD

Composite dynamic password authentication method and authentication system applicable to plug-and-play terminal

The invention discloses a composite dynamic password authentication method and an authentication system applicable to a plug-and-play terminal. The method and the system comprise the following steps: providing remote time service to an embedded terminal through a server, and calculating a first key K1 and feeding back the first key K1 to the server according to time factor change T' and a built-in static key C through the terminal; generating a random number group A according to the situation that terminal right is authenticated by using K1 through the server, and calculating second keys K2, wherein the random number group A comprises a change factor ai, and K2 are HASH values of A, T', C and a built-in dynamic key D; receiving K2 through the terminal, comparing K2 with K2' calculated by the terminal, if the result shows that K2 is accordant with K2', determining whether a password is jumped or not according to characteristic values calculated according to T', if the password is jumped, obtaining ai in the random number group A according to a sequence L and a pointer P, calculating a new key D' according to D so as to replace the key, and loading the new key D' into a non-volatile memory. Two time/event synchronous dynamic password modes are adopted simultaneously, the change characteristics of the password are increased, and the method and the system are particularly applicable to bidirectional authentication of plug-and-play terminals and servers.
Owner:赵姗姗

Beidou short message data transmission method and device, electronic equipment and computer medium

The invention discloses a Beidou short message data transmission method and device, electronic equipment and a computer medium, which are applied to a sending end. The method includes: obtaining target Beidou short message data to be transmitted; encrypting the target Beidou short message data to obtain encrypted Beidou short message data; calculating a check value corresponding to the encrypted Beidou short message data; and transmitting the encrypted Beidou short message data and the verification value to a receiving end. In the present application, the sending end encrypts the target Beidoushort message data,; encrypted Beidou short message data is obtained, a check value corresponding to the encrypted Beidou short message data is calculated; and finally, transmitting the encrypted Beidou short message data and the check value to a receiving end. Therefore, exposure of the target Beidou short message data in the transmission process is avoided, a receiving end can determine whetherthe encrypted Beidou short message data is modified by an attacker or not based on the check value, a receiver can receive the accurate target Beidou short message data, and the transmission securityof the Beidou short message data is improved.
Owner:中电科网络安全科技股份有限公司

File transmitting method and system, sending end equipment and receiving end equipment

The invention relates to a file transmitting method and system, sending end equipment and receiving end equipment, and the method comprises the steps: carrying out the random arrangement of all encryption sub-files corresponding to a to-be-transmitted target file, wherein the sequence of all encryption sub-files can be disturbed so as to improve the difficulty for an illegal person to decrypt an original file, and improve the transmission safety of file information; furthermore, the encrypted file and the information table thereof are respectively transmitted according to different lines, wherein even if an illegal person monitors the transmission line of the encrypted file, the information table cannot be obtained from the line at the same time; therefore, on the one hand, the illegal person cannot recover the original logic sequence of each encrypted sub-file according to the segment serial number and the arrangement sequence in the information table; on the other hand, the illegal person cannot obtain the encryption key and cannot crack the decryption key according to the encryption key, that is, the illegal person cannot decrypt each encrypted sub-file, so that the difficulty is provided for the illegal person to obtain the target file, and the information security of the transmitted target file is improved.
Owner:CHINA INFORMATION TECH SECURITY EVALUATION CENT

Authentication method based on USB-key

The invention discloses an authentication method based on a USB-key. The method comprises the following steps: presetting a PIN code and computing a hash value; verifying the PIN code and generating averification instruction by a client, and encrypting the verification instruction to acquire a first encrypted code; analyzing the first encrypted code to acquire a verification instruction to generate a first random code, and encrypting the first random code to acquire a second encrypted code; analyzing the second encrypted code to acquire the first random code, encrypting the first random codeto acquire the third encrypted code, and encrypting the third encrypted code to acquire the fourth encrypted code; analyzing the fourth encrypted code to acquire the third encrypted code, encrypting the first random code to acquire a fifth encrypted code, and passing the verification if the fifth encrypted code is consistent with the third encrypted code. The system is used for executing the method. The data transmission security is improved by establishing a basic verification system based on PKI/CA, the later authentication procedure is processed based on a session key authenticated at earlystage, the eavesdropping on the data can be effectively avoided, thereby preventing the PIN code from leaking.
Owner:中易通科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products