Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

46results about How to "Prevent deciphering" patented technology

Method and device for improving terminalself-flashing safety through ciphertext handshaking

The invention discloses a method and device for improving terminal self-flashing safety through ciphertext handshaking. The method includes the steps that A, a terminal is connected with a flashing tool so as to enter a downloading preparation mode, feature information of the terminal and feature information of the flashing tool are respectively encrypted through secret keys randomly generated, and therefore a terminal ciphertext and a tool ciphertext are generated; the terminal and the flashing tool interact, the terminal ciphertext and the tool ciphertext are analyzed, and therefore legality and matching performance of the terminal and the flashing tool are verified; B, after it is verified that the terminal and the flashing tool are legally matched, a downloading channel is started by the terminal and the flashing tool for downloading and flashing. According to the method and device, after it is verified that the terminal and the flashing tool are legal, the terminal and the flashing tool are controlled to start the downloading channel to conduct downloading and flashing; due to the fact that the secret keys used for encryption each time are generated randomly, the deciphering difficulty is greatly increased, and the ciphertexts can be prevented from being deciphered; meanwhile, downloading and flashing can be conducted only after the terminal and the flashing tool are legally matched, so that safety is improved.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD +1

Network data transmission device and method for 3d printer

The invention discloses a network data transmission device and method for a 3d printer. The network data transmission device comprises a background data receiving module, a data-caching module, a gcode instruction issuing module, a 3d printer status data receiving module, a 3d printer status data uploading module and a main control processing module, wherein the background data receiving module is used for receiving data coming from a network background; the data-caching module is used for caching the received data coming from the network background; the gcode instruction issuing module is used for issuing a gcode instruction in the cached data coming from the data-caching module to the 3d printer; the 3d printer status data receiving module is used for receiving printing and operation status data of the 3d printer; the 3d printer status data uploading module is used for uploading the printing and operation status data of the 3d printer to the network background; and the main control processing module is used for conducting real-time monitoring process on the printing and operation status data of the 3d printer and controlling the working state of the 3d printer. The network data transmission device and method for the 3d printer have the advantages that operation is easy, the copyright of the gcode instruction is protected, and meanwhile the state of the printer can be obtained by the network background successfully.
Owner:SHENZHEN 7TH TECH CO LTD

GIS position information transmission encryption method and device in trunking communication

The invention relates to the field of information processing in trunking communication, and in particular relates to a GIS position information transmission encryption method and device in trunking communication. The GIS position information transmission encryption method in trunking communication comprises the steps that: a core network receives GIS position information encrypted for one time, and puts the GIS position information encrypted for one time in a KMD data frame format packet; a KMD analyzes and decrypts the KMD data frame format packet, so that the GIS position information is obtained; then, the GIS position information is encrypted for the second time; then, the GIS position information encrypted for the second time forms a packet according to a protocol stack format; a dataframe format packet of the core network is formed, and transmitted to the KMD; the core network analyzes the transmitted data frame format packet of the core network, so that the GIS position information encrypted for the second time is obtained; then, information is forwarded to a corresponding dispatcher according to the KMS forwarded by the number of a subscriber; after receiving KMD forwardinginformation, the dispatcher performs KMD forwarding information decryption through a GIS cryptographic machine, so that the GIS position information is obtained; and the dispatcher sends the GIS position information to the corresponding dispatcher, namely the subscriber, according to the number of the subscriber.
Owner:成都三零瑞通移动通信有限公司

Information encryption system

The invention discloses an information encryption system and relates to the information encryption technology field. The system comprises a communication system, a function database A unit and a function database B unit. The communication system comprises a terminal A and a terminal B, the terminal A and the terminal B being connected through a data transmission module. The terminal A and the terminal B each comprise an encryption module and a decryption module. Each encryption module comprises a memory, an encoder and a data processing module, wherein the memory is connected with the encoder through an information extracting unit, and the encoder and the data processing module are connected through a data transmission unit. The function database A unit is connected with a data encryption module through a data extracting module. Each decryption module comprises a processor, a decoder and an information extracting module which are connected together, wherein the processor is connected with the decoder through a temporary storage unit. The function database B unit is connected with the decoder through a selection unit. Coding rearrangement is conducted through information transmitted by a random selection algorithm, so the encryption intensity of information is further improved.
Owner:合肥左成传媒科技有限公司

Anti-decoding Bluetooth broadcast roller shutter door control method

PendingCN112135298AReduce the risk of being intercepted simulating door openingsImprove securityKey distribution for secure communicationSecurity arrangementAlgorithmMobile end
The invention provides an anti-decoding Bluetooth broadcast roller shutter door control method, and relates to the technical field of control, and the method comprises the following steps: S1, building a central end, and generating an algorithm library in the central end; S2, acquiring the algorithm library corresponding to the controller when the controller is accessed to the central end; S3, calculating a relation corresponding table of time and the algorithm library, and generating a key; S4, when the mobile terminal is accessed to the central end, judging whether a mobile terminal has thecontrol authority of the controller or not, if so, executing S5, otherwise, not executing the operation; S5, enabling the central end to send the key of the controller to the mobile terminal; S6, acquiring the real time, obtaining a corresponding algorithm in the algorithm library through the key, and performing the control and management of the controller through the algorithm. The anti-decodingBluetooth broadcast roller shutter door control method is good in safety, decoding can be effectively prevented, the risk that a wireless signal is intercepted to simulate door opening is effectivelyreduced, the control mode is novel, the method can be used in cooperation with an APP, and financial safety is guaranteed.
Owner:福建安麟机电科技有限公司

Intelligent electronic lock

The invention belongs to the technical field of safety locks, and particularly relates to an intelligent electronic lock. The intelligent electronic lock comprises a lock head, a positioning block andan intelligent regulator, the lock head is of a rectangular structure, the lock head is fixedly connected to one side, close to a pull rod, of a luggage case top, wherein the luggage case is a commonbox-shaped structure body which is folded through a zipper, the intelligent regulator is mounted on one side of the lock head, a fingerprint identifier is fixedly connected to the surface of one side, far away from the luggage case, of the lock head, the fingerprint identifier is used for identifying fingerprints and is electrically connected with the intelligent regulator, the positioning blockis embedded into one side, far away from the pull rod, of the luggage case folding part, the positioning blocks are uniformly distributed along the direction of the luggage case zipper, and symmetrically-designed first grooves are formed in the surface of the positioning block. Through the arrangement of the fingerprint recognizer and the intelligent regulator, the output of the unlocking instruction is completed through the input of the fingerprint of a user, so that the recognition mechanism of the intelligent electronic lock is more rigorous, and the unlocking mechanism of the luggage caseis more perfect.
Owner:张圆圆

Security password setting and verification method

ActiveCN104537300BPrevent decipheringEnter your password in a secure wayDigital data authenticationPasswordCipher
The invention relates to a safe password setting and verifying mode. The safe password setting and verifying mode is characterized by comprising the following steps: (A) basic passwords are set by a user and are composed of a plurality of orderly character codes; (B) an encryption principle is set, encryption operation is carried out on the basic passwords according to the encryption principle to form verifying passwords including valid character codes capable of being used for verifying the user identity and / or position information of the valid character codes, and encryption input prompts coincident with the encryption principle are given to the user; (C) composition of the input passwords is appointed, wherein the input passwords comprise valid codes needing character code value verifying and / or character code value position verifying and interference codes which are at least one bit in length and are used for hiding the positions of the valid codes; (D) when character code values of the valid codes in the passwords input by the user at present and / or the character code position information are / is coincident with information included by the verifying passwords, it is judged that the current passwords is correctly input by the user, and verification of the passwords is successful. By means of the safe password setting and verifying mode, the password inputting safety can be greatly improved, and the passwords are effectively prevented from being stolen and decoded.
Owner:广东金融资产交易中心股份有限公司

A kind of wireless communication module, printing consumables and printer

The present invention provides a wireless communication module, printing consumables and a printer. The wireless communication module is detachably installed on a printer host and / or a processing box of the printing consumables, and is used for wirelessly sending the identification information of the printing consumables To the verification center for legality verification, and receive the legality verification result information fed back by the verification center, and forward the legality verification result information to the printer host, so that the printer host determines whether to execute the printing job according to the legality verification result information. The present invention realizes the method of remote legality verification of printing consumables by the verification center, because the verification work of the present invention is completed by the verification center, and the verification center can combine the latest and most authoritative verification technology to verify the legality of the printing consumables. Carry out verification to prevent illegal production and imitation of printing consumables. At the same time, the wireless communication module of the present invention can be reused, thereby reducing the verification cost of printing consumables.
Owner:前海联大(深圳)技术有限公司

A network data transmission device and method for 3D printers

The invention discloses a network data transmission device and method for a 3d printer. The network data transmission device comprises a background data receiving module, a data-caching module, a gcode instruction issuing module, a 3d printer status data receiving module, a 3d printer status data uploading module and a main control processing module, wherein the background data receiving module is used for receiving data coming from a network background; the data-caching module is used for caching the received data coming from the network background; the gcode instruction issuing module is used for issuing a gcode instruction in the cached data coming from the data-caching module to the 3d printer; the 3d printer status data receiving module is used for receiving printing and operation status data of the 3d printer; the 3d printer status data uploading module is used for uploading the printing and operation status data of the 3d printer to the network background; and the main control processing module is used for conducting real-time monitoring process on the printing and operation status data of the 3d printer and controlling the working state of the 3d printer. The network data transmission device and method for the 3d printer have the advantages that operation is easy, the copyright of the gcode instruction is protected, and meanwhile the state of the printer can be obtained by the network background successfully.
Owner:SHENZHEN 7TH TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products