Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32results about How to "Increase the cost of cracking" patented technology

Dynamic encryption method for Internet of Things device based on login serial number

The application discloses a dynamic encryption method for an Internet of Things device based on a login serial number. The method includes steps: the Internet of Things device generates a first dynamic secret key; the Internet of Things device encrypts a login message by employing the generated first dynamic secret key and obtains an encrypted login message; the Internet of Things device transmitsthe encrypted login message to an Internet of Things platform; the Internet of Things platform receives and verifies the encrypted login message, and generates a login reply message after verification; the Internet of Things platform transmits the login reply message to the Internet of Things device; the Internet of Things device receives and verifies the login reply message; and bidirectional identity authentication of the Internet of Things device and the Internet of Things platform is successful, and the Internet of Things platform and the Internet of Things device mutually transmit ordinary data messages. According to the method, the pseudo-random dynamic secret key is generated through a static secret key and the login serial number of the Internet of Things device, and the securityof communication between the Internet of Things device and the Internet of Things platform is improved.
Owner:TAIHUA WISDOM IND GRP CO LTD

Method and device for authenticating terminal as well as EOC (Ethernet over Coax) terminal

The invention relates to a method and device for authenticating a terminal as well as an EOC (Ethernet over Coax) terminal. The method for authenticating the terminal comprises the following steps of: acquirement: acquiring characteristic domain information of the EOC terminal and first encryption control domain information which is prestored in the EOC terminal and generated according to a preset key and encryption algorithm based on the characteristic domain information; calculation: generating second encryption control domain information according to the preset key and encryption algorithm based on the characteristic domain information; and authentication: judging whether the first encryption control domain information and the second encryption control domain information accord with the preset authentication passing rule or not, allowing the EOC terminal to pass the authentication if the first encryption control domain information and the second encryption control domain information accord with the authentication passing rule; or otherwise, not allowing the EOC terminal to pass the authentication. The invention can achieve the purpose of carrying out the authentication control on the terminal on the basis of not increasing the terminal cost.
Owner:NEW H3C TECH CO LTD

Encryption key generation and encryption method, decryption key generation and decryption method

The invention discloses an encryption key generation method, an encryption method, a decryption key generation method and a decryption method. The encryption key generation method comprises the following steps: acquiring a first key factor; setting a first fixed key, wherein the first fixed key is preset and stored in the encryption equipment; negotiating a first dynamic key, and negotiating between the encryption equipment and the decryption equipment by the first key negotiation method according to the first configuration parameter to obtain the first dynamic key; performing first logical operation on the first key factor, the first fixed key and the first dynamic key to obtain a first encryption key; and performing hash operation on the first encryption key to obtain a second encryptionkey, wherein the second encryption key is used for encrypting data. According to the encryption key generation method provided by the invention, one-packet-one-key are realized, the complexity of theencryption key is high, the security of data transmission is improved, the cracking difficulty is improved, the generated encryption key does not need to be repeatedly set in the data transmission, and the network data transmission performance is ensured.
Owner:西安瑞思凯微电子科技有限公司

Image encryption method based on chaotic mapping and chaotic S-box substitution

The invention provides an image encryption method based on chaotic mapping and chaotic S-box substitution in the technical field of image encryption, and the method comprises the steps: S10, obtaining a color image file, carrying out the Hash calculation, obtaining a Hash value, and calculating a system parameter based on the Hash value; step S20, generating four initial values of four-dimensional hyper-chaotic mapping based on the Hash values, and further obtaining four groups of chaotic pseudo-random sequences; s30, extracting a sequence Wz based on the chaotic pseudo-random sequence and system parameters, and generating a chaotic S box by using the sequence Wz and the S box using the AES algorithm; step S40, performing Arnold scrambling on the color image file to obtain a scrambled image, and performing byte substitution on the scrambled image by using a chaos S box to obtain a substituted image; and S50, performing image diffusion encryption on the three components of the RGB in the substitution image by using the chaos pseudo-random sequence and the system parameters to obtain three pieces of ciphertext data, and obtaining an encrypted image based on each piece of ciphertext data. The method has the advantage that the security of image encryption is greatly improved.
Owner:HUAQIAO UNIVERSITY

Method for generating anti-counterfeiting unique code and performing anti-counterfeiting authentication

The invention discloses a method for generating an anti-counterfeiting unique code and performing anti-counterfeiting authentication. The method includes: generating the anti-counterfeiting unique code, to be more specific, preparing an anti-counterfeiting material, printing and solidifying the anti-counterfeiting material onto a product or a product package, shooting an anti-counterfeiting imagefile in a magnifying manner, performing storage and transmission, performing automatic identification by an image-text identification system, automatically generating and storing the anti-counterfeiting unique code, and generating and printing a commodity identification code; performing anti-counterfeiting authentication, wherein the anti-counterfeiting authentication is performed by scanning thecommodity identification code, inquiring an authenticity inquiry system, directly magnifying and observing the image content of the anti-counterfeiting material for rechecking and the like. The methodhas the advantages that multiple anti-counterfeiting measures are set during the generating of the anti-counterfeiting unique code, a multiple anti-counterfeiting authentication function is achieved,and counterfeiting preventing and authentication are linked with each other; anti-counterfeiting authentication manners are diversified, mutual corroboration of the different anti-counterfeiting authentication manners can be achieved, reverse copying and cracking is difficult, and good anti-counterfeiting performance is achieved; the method is convenient to use and especially suitable for the reliable counterfeiting preventing of high-value commodities in the intelligent Internet era.
Owner:福州固钛光电科技有限公司

Processor

The invention discloses a processor. The processor comprises a configuration information storage region and a recombination control unit; the configuration information storage region is used for storing configuration information, and the configuration information comprises a recombination rule; the recombination control unit is used for controlling a connection relationship among logic devices inthe processor; and the recombination control unit is used for receiving a control instruction obtained by an application which is running in the processor through decoding, selecting the correspondinglogic devices to form a recombination circuit for executing the control instruction according to the recombination rule in the configuration information storage region, thereby realizing execution ofthe control instruction. The processor can control the logic devices forming the recombination circuit; and when one control instruction is realized, the processor can select the logic devices to beconnected to form different recombination circuits according to the recombination rule as needed, so that the cracking cost of the control instruction execution process is effectively reduced, the execution security of the control instruction corresponding to the application, in the processor, in the running process is improved, and the processor is securer and more stable.
Owner:北京多思科技工业园股份有限公司

Security policy version generation method

The invention provides a security policy version generation method, which belongs to the field of computer technology and information security, and comprises the following steps that: a security policy version consists of a plurality of security policy rules, and each security policy rule consists of an algorithm, a secret key and a policy identifier; wherein the security policy version is dividedinto a security policy initial version and a security policy use version; wherein the security policy use version is generated through a security policy initial version, an increment factor and a PCode operation; wherein the PCode comprises a PCode algorithm function and a PCode operating environment, so that the security policy using version is generated by operation of the security policy initial version, the increment factor and the PCode algorithm function in the PCode operating environment. The security policy version provided by the invention can be dynamically changed and updated, is high in security, is difficult to crack even if the key is intercepted, can be widely applied to subway ticket checking terminals, POS terminals and the like, is also suitable for other automatic terminals with similar key systems, has good commercial value, and is worth popularizing.
Owner:咪付(广西)网络技术有限公司

Man-machine identification method based on sliding puzzle verification code

PendingCN112580012AAvoid exposureIncrease the difficulty of reverse decryptionDigital data authenticationAlgorithmTyping
The invention belongs to the field of user identification of computer information security, and relates to a man-machine identification method based on a sliding puzzle verification code. The method comprises the following steps: a client requests a server base map and a sliding block; the server generates a base map, a sliding block and a unique identification code and returns the base map, the sliding block and the unique identification code to the client; the client generates a verification code UI according to the base map and the sliding block; the client collects the displacement of theuser moving sliding block; the client encrypts the collected data and the unique identification code and sends the encrypted data and the unique identification code to the server; the server decryptsthe encrypted data of the client; and the server authenticates the man-machine and returns an authentication result. The method is distinguished from a traditional image-text verification code, so that a code printing recognition black industry tool is out of action, and a certain confrontation protection effect is achieved; meanwhile, the user does not need to identify graphic and text information and related typing operations, and only needs to drag the sliding block to finish picture splicing to finish verification, so that the user operation is simplified, and the user experience is optimized.
Owner:GUANGZHOU FAISCO INFORMATON TECH

Application obfuscation method and device, server and storage medium

The embodiment of the invention provides an application obfuscation method and device, a server and a storage medium. The method includes: replacing a first class name of a code file in an applicationwith a character string, wherein the character strings used for replacing the same first class name are the same, and character strings for replacing different first class names are different; secondly, searching response, replacing a first class name of a code file in the application with class name mapping information generated by the character string, and determining a target character stringused for replacing a second class name in a resource file of the application, wherein the class name mapping information comprises each first class name in the code file and a character string used for replacing the first class name; and finally, replacing the second class name in the application with the first class name replaced with the target character string to obtain the target application.According to the technical scheme provided by the invention, not only is the cracking cost of the application increased, but also the difficulty of reversely cracking the application is increased, sothat the labor fruits of technicians are protected, and the occurrence of loopholes is avoided.
Owner:ZHEJIANG SUPCON TECH

Processor

The invention discloses a processor. The processor comprises an initialization unit, a configuration information storage area and a recombination control unit. Before an application program is loaded, the initialization unit is used for changing each instruction in the application program according to the pre-set changing rule. The application program with the initial state and the changing rule are saved to the configuration information storage area. The recombination control unit is used for reading corresponding application programs with initial states and changing rules from the configuration information storage area. According to reversing rules of the changing rules, each instruction of the application programs with initial states is subjected to recombination operation. Each instruction subjected to recombination operation is inputted to a decoder for decoding. Obtained control signs are sent to corresponding resources component for execution. The scheme can effectively raise cracking cost of the application programs in the processor. Without changing decoding logic of the decoder, safe instructions meeting requirements of the decoder can be ingeniously inputted to the decoder for decoding through instruction recombination. Therefore, operation safety of the processor is ensured.
Owner:北京多思安全芯片科技有限公司

a processor

The invention discloses a processor. The processor comprises an initialization unit, a configuration information storage area and a recombination control unit. Before an application program is loaded, the initialization unit is used for changing each instruction in the application program according to the pre-set changing rule. The application program with the initial state and the changing rule are saved to the configuration information storage area. The recombination control unit is used for reading corresponding application programs with initial states and changing rules from the configuration information storage area. According to reversing rules of the changing rules, each instruction of the application programs with initial states is subjected to recombination operation. Each instruction subjected to recombination operation is inputted to a decoder for decoding. Obtained control signs are sent to corresponding resources component for execution. The scheme can effectively raise cracking cost of the application programs in the processor. Without changing decoding logic of the decoder, safe instructions meeting requirements of the decoder can be ingeniously inputted to the decoder for decoding through instruction recombination. Therefore, operation safety of the processor is ensured.
Owner:北京多思安全芯片科技有限公司

a processor

The invention discloses a processor. The processor comprises a configuration information storage region and a recombination control unit; the configuration information storage region is used for storing configuration information, and the configuration information comprises a recombination rule; the recombination control unit is used for controlling a connection relationship among logic devices inthe processor; and the recombination control unit is used for receiving a control instruction obtained by an application which is running in the processor through decoding, selecting the correspondinglogic devices to form a recombination circuit for executing the control instruction according to the recombination rule in the configuration information storage region, thereby realizing execution ofthe control instruction. The processor can control the logic devices forming the recombination circuit; and when one control instruction is realized, the processor can select the logic devices to beconnected to form different recombination circuits according to the recombination rule as needed, so that the cracking cost of the control instruction execution process is effectively reduced, the execution security of the control instruction corresponding to the application, in the processor, in the running process is improved, and the processor is securer and more stable.
Owner:北京多思科技工业园股份有限公司

An anti-counterfeiting unique code generation and anti-counterfeiting verification method

The invention discloses a method for generating an anti-counterfeiting unique code and performing anti-counterfeiting authentication. The method includes: generating the anti-counterfeiting unique code, to be more specific, preparing an anti-counterfeiting material, printing and solidifying the anti-counterfeiting material onto a product or a product package, shooting an anti-counterfeiting imagefile in a magnifying manner, performing storage and transmission, performing automatic identification by an image-text identification system, automatically generating and storing the anti-counterfeiting unique code, and generating and printing a commodity identification code; performing anti-counterfeiting authentication, wherein the anti-counterfeiting authentication is performed by scanning thecommodity identification code, inquiring an authenticity inquiry system, directly magnifying and observing the image content of the anti-counterfeiting material for rechecking and the like. The methodhas the advantages that multiple anti-counterfeiting measures are set during the generating of the anti-counterfeiting unique code, a multiple anti-counterfeiting authentication function is achieved,and counterfeiting preventing and authentication are linked with each other; anti-counterfeiting authentication manners are diversified, mutual corroboration of the different anti-counterfeiting authentication manners can be achieved, reverse copying and cracking is difficult, and good anti-counterfeiting performance is achieved; the method is convenient to use and especially suitable for the reliable counterfeiting preventing of high-value commodities in the intelligent Internet era.
Owner:福州固钛光电科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products