Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

123results about How to "Increase the difficulty of deciphering" patented technology

Path password input method based on contacts

The invention relates to a path password input method based on touch spots, which is as follows: an input device displays a password input matrix on the display screen of the input device; users lay off a path from the password input matrix as a password through a mouse or a touch screen and other input devices, the password input information is transferred to a processor in the input device; the processor of the input device transforms the path password information into letters or figures, then compares the letters or the figures with the pre-stored password in the processor, if matching, the password validation is passed, and if not, the users need to return to re-input the password. The path password input method based on touch spots has the advantages that: the users orderly pass each spot of the password input matrix to form the path as the password, which ensures the password input becomes easy and rapid, improves the memorability of the password and high intensity of the setting,; and the path password does not have any relations with the personal profile, which is not easy to form the password dictionary. The path password input method based on touch spots not only can be used for password input, but also can be used as a short cut for starting a certain program or can be used as a shortcut key of a certain function of the program.
Owner:FUJIAN ETIM INFORMATION & TECH

DNA coding based encryption system and encryption method

The invention belongs to the technical field of information security in communication transmission, and particularly relates to a DNA encryption system and an encryption method. The system comprises an encryption key, an information conversion portion, an information encryption portion, an information transmission portion, a decryption key and an information decryption portion, wherein the encryption key and the decryption key are primer sequences; and information encryption refers to that information is converted and coded and then corresponds to A, T, C, G bases in DNA in a one-to-one mode according to a predetermined rule. The encryption system and the encryption method provided by the invention can realize automatic operation of corresponding code conversion, encryption and decryption by depending on biological problem setting and biological technology development and by being matched with development of corresponding computer information technologies at the same time, have the characteristics of good compatibility with other encryption methods, high automation degree, simple key, high password cracking difficulty, safer information transmission and the like, has good application values, and can provide better reference for other new encryption systems at the same time.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

OFDM communication signal physical layer encryption method and device

The invention belongs to the technical field of communication security, and particularly relates to an OFDM communication signal physical layer encryption method and device, and the method comprises the steps: carrying out the symbol-by-symbol switching of a chaotic phase sequence initial value through a communication signal transmitting end secret key generation module; generating a dynamic composite chaotic sequence by combining the improved Logistic chaotic mapping and the Chebyshev chaotic mapping, and performing nonlinear disturbance on the composite chaotic sequence to obtain a chaotic sequence for encryption; and mapping the chaotic sequence to an OFDM rotation phase vector to complete physical layer encryption. According to the invention, symbol-by-symbol switching of chaotic sequence initial values is carried out; then, generating a composite chaotic sequence by combining the improved Logistic chaotic mapping and the Chebyshev chaotic mapping; the sequence randomness is improved through nonlinear disturbance, the initial value sensitivity of chaotic mapping is fully utilized, the decoding difficulty is further increased, compared with a traditional chaotic phase encryptionscheme, the operand is greatly reduced, the communication safety performance is greatly enhanced while the encryption chaotic performance is improved, and good application value is achieved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Encryption and decryption method and device based on zipper type dynamic hash and NLFSR

An encryption and decryption method based on zipper type dynamic hashes and NLFSRs comprises the following steps that a nonlinear feedback function and a bit transformation Boolean function are used for preprocessing a seed secret key to form a secret key stream sequence; changing the bit value of the plaintext sequence according to the bit transformation Boolean function based on the key stream sequence to form a pseudo plaintext sequence; dividing the pseudo-plaintext sequence into a plurality of paths of pseudo-plaintext subsequences according to the key stream sequence; and calculating a dynamic hash address corresponding to the binary bit of each pseudo plaintext sequence according to a hash mapping rule depending on the key stream sequence, and mapping the pseudo plaintext subsequence hashes which are divided into multiple paths into a ciphertext space to form the ciphertext stream sequence. The method has the beneficial effects that the key stream generator not only uses a nonlinear feedback shift register, but also introduces a bit transformation Boolean function, so that the key stream with longer period and better randomness is obtained; and through a plaintext bit transformation rule and a zipper type dynamic hash mapping rule, the decoding difficulty of the ciphertext stream sequence is improved.
Owner:ZHUHAI COLLEGE OF JILIN UNIV +1

Signal generator capable of flexiblely modulating in segmentable mode

The invention provides a signal generator capable of flexiblely modulating in a segmentable mode. The signal generator comprises an input module used for receiving carrier wave configuration information and modulated wave configuration information input by a user; wherein the modulated wave configuration information comprises modulated wave configuration queues and corresponding time intervals; a queue mapping module used for transiting the modulated wave configuration queues to modulated wave control word queues; a modulation module used for storing the modulated wave control word queues, and taking each queue element in the modulated wave control word queues according to the time intervals, and generating multiple groups of regulate control parameters according to the carrier wave configuration information and each queue element; and a carrier wave DDS module used for generating multi-segment modulating signals according to the multiple groups of regulate control parameters and the carrier wave configuration information. The signal generator can realize the segmented regulation function of variable frequency, phase or amplitude of modulated signals, complexity of the generated modulated signal is high, and the modulated signal is difficultly intercepted and decoded, and is suitable for practical application occasions such as modulation-demodulation experiments.
Owner:SUZHOU RIGOL PRECISION ELECTRIC TECH

Lightweight cryptographic algorithm SCENERY implementation method and device and storage medium

The invention discloses a lightweight cryptographic algorithm SCENERY implementation method, a lightweight cryptographic algorithm SCENERY implementation device and a storage medium. The method comprises the steps that a plaintext to be encrypted is acquired, IP1 initial replacement, a round function, key expansion and IP2 replacement are carried out in sequence, the round function comprises sequentially carrying out round key addition operation, S box replacement and M matrix replacement on data, and the key expansion comprises sequentially carrying out S box replacement, cyclic left shift, round constant addition operation and DP dynamic replacement on a key. An F function of an SPN structure is adopted as a round function, and a binary matrix M is constructed with the purpose of achieving high dependence when an F function linear layer is designed; a round constant and a key expansion intermediate result are selected as control signals for key expansion; DP dynamic replacement is carried out on a current round key expansion intermediate result to obtain a round key, which is a new key expansion mode, the relevance of single key iteration to front wheel input is reduced, the decoding difficulty is increased, the security is improved, and differential and linear attacks and algebraic attacks can be particularly and effectively resisted.
Owner:HENGYANG NORMAL UNIV

Power distribution automation information encryption method based on quantum reinforcement

The invention discloses a distribution automation information encryption method based on quantum reinforcement, and the method comprises the steps: presetting a key pool A in a master station and all terminals, independently setting a key pool B in the master station, pre-storing a key in the key pool A, pre-storing or storing a newly added key in the key pool B, and storing the newly added key in the key pool B, wherein the keys are quantum keys converted after quantum random numbers are generated by a quantum random number generator; distributing key packets: the terminals communicate with the master station, the terminals and the master station jointly select a key a from the key pool A, the master station extracts part of keys from the key pool B to form a key packet, and the key packet is encrypted by using the key a and sent to all the terminals; the terminal decrypting the received key packet by using the key a, extracting the key in the key packet for performing secondary encryption and decryption on the state grid encrypted message, and marking the key in the key packet after being used; and after all the keys of the key packet in the terminal are marked, a key a being selected from the key pool A again, and key packet distribution being performed again.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products