Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

49results about How to "Increase the difficulty of decryption" patented technology

Metasurface structure design method realizing multi-dimensional optically manipulative image transformation

InactiveCN110133758AImplement image transformation operationsAvoid crosstalkPolarising elementsLength waveMulti dimensional
The present invention relates to the technical field of optical devices based on an artificial metasurface structure, more specifically, the invention relates to a metasurface structure design methodrealizing multi-dimensional optically manipulative image transformation. A metasurface structure composed of structural units is constructed on a transparent substrate; pixels of the metasurface structure are formed by the coherent interference among the structural units; a Jones matrix J is obtained for the structural unit with a rotation angle of phi; according to the incident light acting on the structural unit, a scattering factor of the incident light is obtained on the basis of the Jones matrix J of the structural unit; considering the pixels composed of the n structural units, when theincident light is incident on the transparent substrate at the incident angle theta, the wavelength lambda and the polarization state sigma, the intensity of the pixels of the metasurface is formed bythe coherent interference of all the structural units; and the multi-dimensional optically manipulative image transformation function of the metasurface structure is realized. The invention can realize the image transformation with any multi-dimensional optical parameters and solves the image crosstalk problem.
Owner:SUN YAT SEN UNIV

Information processing method and device based on characteristics of information, equipment and medium

The embodiment of the invention discloses an information processing method and device based on information features, equipment and a medium, and mainly relates to a block chain technology and a hospital management technology, and the method comprises the steps: obtaining a target function for describing information and feature information of target information; dividing the target information according to the feature information of the target information to obtain at least two pieces of sub-information; obtaining a random number corresponding to each piece of sub-information, and adjusting each piece of sub-information according to the random number to obtain each piece of adjusted sub-information; according to the target function and each piece of adjusted sub-information, obtaining coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information; encrypting the coordinate information corresponding to each piece of sub-information inthe at least two pieces of sub-information to obtain a cipher text of the coordinate information corresponding to each piece of sub-information; and determining the cipher text as the cipher text of the target information, and storing the cipher text of the target information in the block chain network. By adopting the embodiment of the invention, the information security can be improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Encryption method, device and equipment based on features of information and storage medium

The embodiment of the invention discloses an encryption method, device and equipment based on features of information and a storage medium, and the method comprises the steps: obtaining a target function for describing information, and the feature information of to-be-processed target information; dividing the target information according to the feature information of the target information to obtain at least two pieces of sub-information; obtaining coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information according to the target function; encrypting the coordinate information of each piece of sub-information in the at least two pieces of sub-information to obtain a ciphertext of the coordinate information corresponding to each piece of sub-information; and determining the ciphertext of the coordinate information corresponding to each piece of sub-information as the ciphertext of the target information, and storing the ciphertext of the target information in a blockchain network. By adopting the method, the security of the target information can be improved, the method is suitable for the field of smart medical treatment, and the construction of smart cities can be further promoted.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Industrial internet data encryption storage system

The invention discloses an industrial internet data encryption storage system, which relates to the technical field of data storage and comprises a data classification module, a data transfer module and a storage distribution module. The data classification module is connected with the private cloud and is used for carrying out storage grade analysis on the industrial internet data stored in the private cloud, if a storage grade value is greater than or equal to a storage threshold value, marking the corresponding industrial internet data as core data, and initiating encryption transfer of the corresponding core data; the data transfer module is used for randomly splitting the corresponding core data into a corresponding number of data blocks according to the storage level value, encrypting the corresponding data blocks and then storing the encrypted data blocks in the block chain module in a distributed manner; the block chain module comprises a plurality of storage blocks and is used for screening out a corresponding number of storage blocks as selected blocks according to the size of the storage and allocation values and carrying out distributed storage on the data blocks; the possibility that the data blocks are cleaned is effectively reduced, other users can conveniently inquire, and the data storage efficiency is improved.
Owner:万申科技股份有限公司

Anti-fake tracing method based on hyper-elliptic curve cryptosystem

The invention discloses an anti-fake tracing method based on a hyper-elliptic curve cryptosystem. The anti-fake tracing method comprises the following steps: setting a production enterprise code, a date code and a specification code; performing encryption conversion on the production enterprise code, the date code and the specification code through a conversion method of system conversion and section partition; performing permutation and combination on section identification codes and authentication type codes in the production enterprise code, the date code and the specification code and generating a check code; taking an elliptic cure cryptosystem as a public key infrastructure platform, designing the tracing method and using a C/S architecture; a system distributes a public key and a private key to a handheld device, and during decoding, the handheld device inquires the public key and the private key to a server, compared with the existing anti-counterfeit technology, the anti-fake tracing method based on the hyper-elliptic curve cryptosystem provided by the invention has the advantages of being large in data volume and difficult to be imitated; besides, the security, the uniqueness and the unduplicatedness of data are guaranteed, the decoding difficulty is increased and the anti-falsification is strong.
Owner:SHANDONG ACADEMY OF AGRI MACHINERY SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products