Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

246results about How to "Prevent eavesdropping" patented technology

Smart grid information transmission safety protection device and safety protection method

The invention discloses a smart grid information transmission safety protection device and a safety protection method, which relate to the technical field of smart grid information transmission safety. The device comprises a certificate server, an encryption and decryption module, a compliance check module and an exception handling module, wherein the encryption and decryption module is wholly serially connected between a station level and a bay level for carrying out encryption signature and signature verification decryption functions on original transparently-transmitted data; the compliance check module grabs a plaintext data packet in an offline or online mode and submits the plaintext data packet to the detection module for compliance check, and as for a compliance message, an analysis result is stored to a log database in a log format; and exception information is independently stored in an exception database through the exception handling module, and an administrator is notified. In the case of permissible delay in the smart grid, the encryption and decryption module together protects the internal information of the smart grid, behaviors that the internal data are tampered and destructed in the case of transmission are resisted, and the safety of the grid is further improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM +2

Secrete communication system and method for smart phone

The invention belongs to the technical field of information safety, in particular to secrete communication of a smart phone. According to the technical scheme, a secrete communication system for the smart phone comprises a communication management platform (1), a main control service system (3) and a plurality of secrete mobile phones (3). Compared with the technology and method for the other secrete mobile phones, the secrete communication system and method use an encryption crushing technology and a recombination decryption technology to transmit complete communication information through x mobile communication signal channels, and each mobile communication signal path transmits one part of cipher-text fragments of a voice data unit or a short message; people cannot restore the complete cipher-text not to mention the plain text of the voice or the plain text of the short message through eavesdropping any one of the mobile communication signal channels, and therefore, the illegal eavesdropping on the mobile communication network is effectively avoided; the voice data or short message encryption, decryption and crushing recombination are performed in a customized SD key in the secrete mobile phone, and the rogue program eavesdropping to the secrete mobile phone terminal can be effectively avoided.
Owner:BEIJING CHERILEAD TECH

Security data communication achieving method based on quantum key distribution

The invention discloses a security data communication achieving method based on quantum key distribution. In traditional data communication based on quasi single-photon source quantum key distribution, a large number of quantum bits will be consumed in the data reconciliation process, and quantum key distribution efficiency is low. According to the security data communication achieving method based on quantum key distribution, a new quantum security communication model is built, the data reconciliation process is omitted, original key error codes are equivalent to channel error codes, and data secrecy transmission is achieved by exchanging the encryption and decryption sequence and the channel coding frequency. Dolay coding with the high error correcting capability is adopted for channel coding, original keys are used for encrypting and decrypting the coded data in a one-time pad mode, Dolay decoding is carried out on the decrypted data with error codes, and verification is carried out in an experiment system. Research results show that the quantum key distribution process is simplified, the key security is enhanced, computing and communication resources are saved, the key generating rate is improved, and a new idea is provided for quantum key distribution.
Owner:PLA UNIV OF SCI & TECH

Bluetooth master and slave devices and method for establishing safety channel between same

The invention discloses Bluetooth master and slave devices and a method for establishing a safety channel between the same, and belongs to the field of information safety. The method comprises: both the Bluetooth devices exchange respective device information; according to the device information, a connection is established between the Bluetooth devices; both the Bluetooth devices exchange and verify respective authentication keys generated according to a same algorithm; and after authentication is successful, both the Bluetooth devices generate communication encryption keys according to a same algorithm, so that the safety channel is established between the Bluetooth devices. The Bluetooth slave device comprises a data receiving module, a first data sending module, a second data sending module, a data generation module, an operation module, a judgment module, a communication encryption module and a display module; the Bluetooth master device comprises a data receiving module, a data sending module, a data generation module, an operation module, a judgment module, a communication encryption module and an input module. The connection between the Bluetooth devices by verification codes is achieved, and the malicious connection of other devices is prevented.
Owner:FEITIAN TECHNOLOGIES

Safe fire-fighting equipment inspection method

The invention discloses a safe fire-fighting equipment inspection method. The method comprises steps as follows: step 1: fire-fighting equipment is registered through a fire-fighting equipment management platform of the fire-fighting monitoring center; step 2: the identity of an inspector is verified through a mobile terminal APP and the inspector receives allocated inspection tasks and inspection standards; step 3: the inspector arrives in the inspection location, the position of the inspector is verified, and the fire-fighting equipment is inspected according to the inspection standards; step 4: whether the inspection tasks are completed is verified, and a dynamic QR code is generated by a safe inspection QR code generator after verification passes; step 5, the dynamic QR code is scanned, and the inspection state information of the fire-fighting equipment is read and uploaded to the fire-fighting equipment management platform of the fire-fighting monitoring center. According to the safe fire-fighting equipment inspection method, accidents such as damage to the system by an illegal person disguised as an inspector, irresponsible behavior of the inspector for inspection, fake inspection behavior and the like are avoided by verifying the legal identity of the inspector, the position of the inspection location and the inspection process; transmission safety is guaranteed and eavesdropping and tampering attack are prevented by establishing safety communication.
Owner:北京富邦智慧物联科技有限公司

Strong discrimination method of enciphered mode by public key cryptographic algorithm

This invention discloses a strong distinguishing method adopting open code key calculation encryption mode. The process is:found wireless chain-channel, the identifier sends the identification request to the user, and return the identification information to the server, the server find the user open code key and the information integrality code key from the database to found the dialog with the user, the server and the user produce the random numbers, encode the open code key for each other, decode the code key through the identifier, compare self random number with the random number changed by the opposite side and judge whether the identification is successful. Repeat this process for three times, and the server and the user calculate the whole identification and exchange integrality value through encoding and decoding code key and the information integrality code key and the relative information. The identifier judges whether the identification is successful, decides whether the user can get into the network and realizes the online communication of users and the broadcasting of the base station. The strong points are that it realizes the insurance of the identification of the user and the server and the safety of the communication.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Start-up system and start-up method based on dynamic human body characteristic recognition

The invention provides a start-up system based on dynamic human body characteristic recognition. The start-up system comprises two functional modules including an identification module and an execution module, wherein the identification module is used for identifying a user identity through carrying out dynamic human body characteristic information verification on a user; information interaction is carried out between the identification module and the execution module in a traditional wireless communication manner or an inductive communication manner; the execution module receives a start-up signal sent by the identification module and executes the corresponding start-up movement; all functions of the identification module can be realized on a mobile intelligent terminal; the inductive communication is realized by coupling, complementation and the like of various signals; meanwhile, various field signals in a communication process can be subjected to physical encryption so that the communication safety is guaranteed. The system disclosed by the invention takes the mobile intelligent terminal as main equipment, is strong in safety and convenient to use; the system is particularly suitable for starting up various types of equipment which is private and exclusive or needs authorization permission.
Owner:ZHEJIANG UNIV

High-reliability cluster operation and maintenance management method

InactiveCN106100894ASupport manual hot switchingSupport automatic failoverData switching networksFault toleranceControl layer
The invention discloses a high-reliability cluster operation and maintenance management platform method. Specifically, the method comprises (1), a high-reliability cluster control command web access and http form scheduling release step of establishing a cluster operation and maintenance web management platform, wherein remote management and visual management of a cluster are realized, and reliability of cluster operation and maintenance web management is realized from an access layer, a scheduling layer and a central control layer through adoption of a load balance technology and redundancy and fault-tolerance technologies; (2), a high-reliability cluster control command transmission and issuing step of in a data transmission process, encrypting transmission data and an AES key by employing AES and RC4 algorithms, carrying out base 64 coding on encrypted data, and transmitting the coded data through an ssh tunnel, thereby realizing data reliability of the cluster operation and maintenance management; and (3), a high-reliability cluster control command performance and feedback step of establishing an expandable cluster operation and maintenance central operation and maintenance control system, wherein various configuration management frames and a user customized configuration frame are supported, and central control reliability of the cluster operation and maintenance management is realized.
Owner:SOUTH CHINA UNIV OF TECH

Ultrasonic active sound attenuation anti-eavesdrop and anti-wiretapping device, and anti-eavesdrop and anti-wiretapping method using the device

InactiveCN105047191AProtection against eavesdropping or wiretappingImprove securitySound producing devicesCarrier signalVIT signals
The invention claims an ultrasonic active sound attenuation anti-eavesdrop and anti-wiretapping device, and an anti-eavesdrop and anti-wiretapping method using the device. The device comprises an ultrasonic generator which is used for generating ultrasonic signals, a valid audio frequency information gatherer which is used for gathering valid audio frequency information which may be eavesdropped and wiretapped, an inverter which is connected with the valid audio frequency information gatherer for performing backward processing of the valid audio frequency information and forming active sound attenuation interference audio frequency information, a modulator which can modulate the active noise reduction interference audio frequency information by taking the ultrasonic signals as carrier waves so as to form modulated ultrasonic signals, and an ultrasonic transmitter which is connected with the modulator for transmitting the modulated ultrasonic signals. The ultrasonic active sound attenuation anti-eavesdrop and anti-wiretapping device of the invention can interfere various types of eavesdropping and wiretapping devices in the prior art effectively, thus effectively preventing eavesdropping or wiretapping of conference information or military content, and improving safety of the information.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Intelligent submarine cable with invisibly implanted sensing fiber in cable core insulating layer

The invention discloses an intelligent submarine cable with an invisibly implanted sensing fiber in a cable core insulating layer. The intelligent submarine cable comprises a cable core, a sensing fiber and an outer armor strengthening protective layer. The cable core comprises an insulating sheath. The insulating sheath is divided into an inner insulating layer and an outer insulating layer. The sensing fiber is invisibly implanted between the inner insulating layer and the outer insulating layer. The sensing fiber wraps the inner insulating layer with appropriate pitch and is wound and bound through gauze bundling. The sensing fiber which is invisibly implanted in the insulating sheath is used with a suitable detection instrument and system to carry out distributed online monitoring on the position movement of the cable and shape strain of bending, torsion and the like of the cable body, and sensitively detect the information of water sound, seismic waves, boat approaching, anchor hooking and the like within a certain range from the submarine cable. Due to the fact that the sensing fiber is invisibly implanted in the cable core insulating layer and is adhered with the insulating layer, the behavior of cable core stripping can be timely identified, and communication fiber intercepting is effectively prevented. The anti-intercepting intelligent submarine cable integrates communication and sensing.
Owner:江苏通光海洋光电科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products