Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

40results about How to "Realize confidential communication" patented technology

Method for key management and node authentication of sensor network

The invention relates to a method for key management and node authentication of a sensor network. The method comprises the following steps: 1) key pre-distribution, wherein a deployment server is used for establishing communication keys for the secure connection between nodes and distributing the communication keys to all the nodes before network deployment; 2) key establishment, wherein key pairs for the secure connection are established between nodes after the network deployment; and the step of key establishment further comprises the following steps: 2.1) the establishment of shared keys, wherein key pairs are established between adjacent nodes having the shared keys; and 2.2) the establishment of path keys, wherein key pairs are established between nodes having no shared keys but multi-hop secure connection; and 3) the authentication of node identities, wherein the identity authentication is carried out before the formal communication between nodes, so as to confirm the validity and effectiveness of the identity of the other party. The invention is capable of effectively resisting the attack on network communication, such as eavesdropping, tampering and resetting, achieving the secure communication between nodes, effectively saving the node resources of the sensor network and prolonging the service life of the sensor network.
Owner:CHINA IWNCOMM

Stepping frequency radar system based on chaotic signal source, and channel construction method thereof

The invention discloses a stepping frequency radar system based on a chaotic signal source. The system comprises a signal emission module, a signal receiving module, the chaotic signal source and a data rearrangement module. The chaotic signal source generates chaotic signals, on one hand, controls the emission frequency sequence of an emission pulse string, and on the other hand, performs reordering control on echo signals received by the signal receiving module. The invention also discloses a channel construction method of a stepping frequency radar system. The method enables each chaotic signal sampling value to be corresponding to a group of frequency modulation sequences after normalization processing is performed on each chaotic signal sampling value, controls the signal emission module to emit pulse strings corresponding to the group of frequency modulation sequences, and controls the signal receiving module to rearrange signal echo vectors according to pulse frequencies in an increasing order. The method, on one hand, enables emission signals to be provided with higher anti-interference capability and lower interception probability, and at the same time, solves the problem of quite poor clutter inhibition capability of stepping frequency signals in a conventional stepping frequency system.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Method for implementing secret communication between communication terminal and wireless access point

The invention relates to a method for secret communication between communication terminal and wireless access point comprising following steps: (1) presetting unique identification information and communication key in encryption device, storing authenticated identification information and key of encryption device at wireless access point; (2)connecting encryption device and communication terminal via communication interface and acquiring power supply, installing and operating dedicated drive program on communication terminal; (3) the encryption device sending authentication request including identification information to wireless access point; (4) wireless access point authenticating the encryption device according to identification information included in authentication request, if authentication being successful, then fetching corresponding key and sending notice of permission for access; (5) the encryption device notifying communication terminal of the established connection with wireless access point after receiving permission for access, encrypting, deciphering the transmitted data by communication key; wireless access point encrypting and deciphering the transmitted data via key.
Owner:AIGO DIGITAL TECHNOLOGY CO LTD

Security payment system and method for near field communication mobile terminal

The invention provides a security payment system and a method for a near field communication mobile terminal. The mobile terminals of two trading parties send respective symmetric keys to a third party payment platform for preservation, the interacted data between the mobile terminals of two trading parties and the third party payment platform use the corresponding symmetric keys for encryption and decryption subsequently, secure communication between the mobile terminals of two trading parties and the third party payment platform is realized, a payer completes authentication operation on themobile terminal during the payment process, and the process is secure and reliable. Through carrying out integrity verification on the trading data, verification is carried out through a random numberto avoid a replay attack, and the security and the reliability of the whole payment process are enhanced further; the payment system supports a fast payment function based on the JR / T 0025 Chinese financial integrated circuit (IC) card specification series standard, and the security is high; and payment functions such as acquiring and transfer can be completed only by installing a wallet securityapplication in the near field communication mobile terminal, the user experience is improved, and promotion and application are facilitated.
Owner:北京银联金卡科技有限公司

Method for implementing secret communication of wireless local area network

The invention relates to a method for implementing encrypted communication for wireless LAN comprising (1) presetting identification information in encryption device, storing identification information in authentication device, establishing information table of corresponding relation of identification information and characteristic information in authentication device, connecting the access point and authentication device; (2) installing and operating dedicated drive program; (3) encryption device sending authentication request to authentication device; (4) the authentication device authenticating according to identification information, if the authentication being successful, then fetching corresponding characteristic information, transmitting the first key created from the characteristic information by the authentication device according to the algorithm to wireless access point, and transmitting to encryption device; (5) the encryption device acquiring characteristic information via wireless access point, and creating a key from the characteristic information according to same key creation algorithm; (6) wireless access point and encryption device encrypting and deciphering the transmitted data via the first key in wireless channel.
Owner:AIGO DIGITAL TECHNOLOGY CO LTD

Secure communication system based on random time sequence four-dimensional circular ring array

The invention discloses a secure communication system based on random time sequence four-dimensional circular ring array. The basic structure comprises a circular ring antenna array, a phase shifter,a time modulator, a pseudo-random time sequence generator, a circulator, a power amplifier, a transmitting combination success divider, a receiving common power divider, a transmitter, a receiver andthe like. The biggest innovation of the invention lies in that random time modulation is used, so that the antenna gain in a desired direction is not changed and the antenna gain in an undesired direction is not changed randomly. The method can be applied to all modulation systems based on amplitude and phase, such as BPSK, QPSK and the like. The circular ring array is introduced, so that omnidirectional secure communication can be realized. Compared with an existing secure communication mode based on a four-dimensional antenna array, the method provides a new random time modulation mode, onlyrandom and messy signals can be received in the unexpected direction, the problem that an existing system is insufficient in safety is solved, and full-airspace secure communication can be achieved.The present invention is used in a wireless communication system.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Message authentication and group key negotiation method based on vehicle-mounted short distance communication network

The invention discloses a message authentication and group key negotiation method based on a vehicle-mounted short distance communication network, comprising steps of utilizing a road side node arranged at a crossroad to detect the state of a signal lamp, constituting vehicles having same geographic position information and same driving directions into a cluster during the red light, performing verification on the vehicle-mounted node in the cluster through a certificate authorization center, and distributing a secret key to the vehicle-mounted node passing through the verification, wherein the vehicle-mounted node in the cluster utilizes the distributed secret key to generate a group code through a cluster code negotiation process and thus utilizes the group code to realize the confidential communication between the vehicle-mounted nodes. The message authentication and group key negotiation method utilizes the V2X network characteristics, like the characteristics of the road side node, that the vehicle-mounted node is in the halted state when the red light is on and the status of all vehicle-mounted nodes are equal, realizes the information verification of the vehicle-mounted nodes and the cluster secret key negotiation process in the V2X network, and improves the safety of the V2X network.
Owner:DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD

Secret key distribution method based on session initiation protocol (SIP) communication system

The present invention discloses a secret key distribution method based on an SIP communication system. The secret key distribution method is realized based on a communication system composed of a VOIP server, a secret key distribution server and a plurality of terminals, and is characterized in that the terminals send the calling request messages to the VOIP server, the VOIP server sends a secret key obtaining request message to the secret key distribution server, and the secret key distribution server utilizes the public keys of the terminals to generate the secret key data of the terminals and distributes the secret key data to the terminals via the VOIP server; after receiving the corresponding secret key data, the terminals utilizes the own private keys to decrypt the secret key data to obtain the session keys, and the calling and called terminals utilize the session keys to realize the secret communication. According to the present invention, a secret key distribution process is simplified, the secret key data is transmitted to the terminals by the SIP messages in communication connection without needing to increase the message number additionally, the real-time performance is stronger, and the secret communication of the terminals can be realized.
Owner:BEIJING DATANG GOHIGH DATA NETWORKS TECH CO LTD

Secret communication method based on fraction order Fourier transform order-multiplexing

The invention relates to a secret communication method based on fraction order Fourier transform order-multiplexing, belonging to the information safety field. The secret communication method comprises the following steps: establishing linear equations by using the relation among filters in a multiplex transmission multiplexer accurately reestablished by fraction order Fourier domains with different orders and selecting discrete-sampling discrete fraction order Fourier transform as a basic tool, realizing the demodulation of the fraction order Fourier transform order-multiplexing; and realizing effective recovery of transmission information by using the multiplexed fraction order Fourier transform order as a secret in the information decryption. The secret communication method based on thefraction order Fourier transform order-multiplexing completely utilizes the order change characteristic of the fraction order Fourier transform, enlarges the secret space relative to the traditionalsecret communication method based on fraction order Fourier transform, improves the safety of the system, can realize secret communication under a multi-carrier mode, and can provide a new way for thedesign of a multi-user communication system.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Secret communication system based on double chaotic modulation

The invention relates to a secret communication system based on double chaotic modulation, and the system comprises: a transmitting end which comprises a first chaotic laser which is connected with acoupler, wherein the coupler is connected with a first isolator, the first isolator is connected with a photoelectric switch, a second chaotic laser is connected with a second isolator, and the secondisolator is connected with the photoelectric switch; a receiving end which comprises a third chaotic laser which is in communication connection with a circulator, wherein the circulator is in communication connection with a second photoelectric detector, the second photoelectric detector is in communication connection with a cross-correlator, the cross-correlator is in communication connection with a first radio frequency amplifier and a decision device, and the first radio frequency amplifier is in communication connection with the first photoelectric detector; and a circulator which is in communication connection with the coupler, wherein the photoelectric switch is in communication connection with the first photoelectric detector. According to the invention, double chaos is utilized tospread spectrum of digital information, identical chaotic sequences are synchronously generated, and after the sending end receives information modulation, the receiving end utilizes synchronous local signals to demodulate the information, so that secret communication is realized.
Owner:深圳立专技术转移中心有限公司

Method for implementing secret communication between communication terminal and wireless access point

The invention relates to a method for secret communication between communication terminal and wireless access point comprising following steps: (1) presetting unique identification information and communication key in encryption device, storing authenticated identification information and key of encryption device at wireless access point; (2)connecting encryption device and communication terminalvia communication interface and acquiring power supply, installing and operating dedicated drive program on communication terminal; (3) the encryption device sending authentication request including identification information to wireless access point; (4) wireless access point authenticating the encryption device according to identification information included in authentication request, if authentication being successful, then fetching corresponding key and sending notice of permission for access; (5) the encryption device notifying communication terminal of the established connection with wireless access point after receiving permission for access, encrypting, deciphering the transmitted data by communication key; wireless access point encrypting and deciphering the transmitted data viakey.
Owner:AIGO DIGITAL TECHNOLOGY CO LTD

Multi-user wireless communication system and method based on space-time coding metasurface

The invention discloses a multi-user wireless communication system based on a time-space coded supersurface. The transmitting end mainly includes a time-space coded metasurface, a feed antenna, and a digital control module; the receiving end is a traditional demodulation device. The invention also discloses the wireless communication method of this system. The feed antenna transmits a single-tone signal to the metasurface, and uses an algorithm to optimize the space-time encoding matrix, and jointly controls the energy distribution of the reflected signal in the space domain and the frequency domain, so that different harmonics The spatial beam of the system points to users in a specific direction for direct encoding of information; through the digital control module, different space-time encoding matrices are switched in real time, and different information is transmitted to multiple designated users simultaneously and independently, while users in other directions cannot demodulate. The transmitter has the characteristics of directional modulation, which can realize confidential communication and anti-interference; it also acts as a space mixer and antenna radiation, eliminating the need for digital-to-analog conversion, mixing and amplification RF modules, simplifying the communication transmitter architecture.
Owner:SOUTHEAST UNIV

Two-standard four-real data security access system based on 5G edge computing

The invention relates to a two-standard four-real data security access system based on 5G edge computing, and the system comprises the following parts: a key generator which is used for verifying the identity of a user, and obtaining a key transmitted by a Beidou controller after the verification succeeds; a key verifier which is associated with the key generator and is used for acquiring a key obtained by a user through the key generator; a 5G edge computing system which comprises a key verification device that interacts with a 5G base station through a 5G air interface and further interacts with the key verifier through a 5G slicing technology, and which is used for obtaining the key and verifying the key through the key verification device to obtain a verification result; the two-standard four-real system platform which is deployed in a public security internal network and is used for storing two-standard four-real data and allowing the key verifier to get access when the verification result obtained by the 5G edge computing system passes. According to the invention, the key generator and the key verifier can be used outside the public security private network to provide preconditions for an extranet user to access the public security intranet two-standard four-real platform data.
Owner:广州瀚信通信科技股份有限公司

Secret communication method based on fraction order Fourier transform order-multiplexing

The invention relates to a secret communication method based on fraction order Fourier transform order-multiplexing, belonging to the information safety field. The secret communication method comprises the following steps: establishing linear equations by using the relation among filters in a multiplex transmission multiplexer accurately reestablished by fraction order Fourier domains with different orders and selecting discrete-sampling discrete fraction order Fourier transform as a basic tool, realizing the demodulation of the fraction order Fourier transform order-multiplexing; and realizing effective recovery of transmission information by using the multiplexed fraction order Fourier transform order as a secret in the information decryption. The secret communication method based on the fraction order Fourier transform order-multiplexing completely utilizes the order change characteristic of the fraction order Fourier transform, enlarges the secret space relative to the traditionalsecret communication method based on fraction order Fourier transform, improves the safety of the system, can realize secret communication under a multi-carrier mode, and can provide a new way for the design of a multi-user communication system.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

A two-way wireless voice security communication system and method based on lorenz chaotic circuit

Disclosed are a double-path wireless voice secret communication system and method based on a Lorenz chaotic circuit. The system comprises a first wireless voice secret communication system and a second wireless voice secret communication system; each wireless voice secret communication system comprises a wireless voice sending system and a wireless voice receiving system; each wireless voice sending system comprises a Lorenz chaotic driving system circuit, a step-down interface circuit, a wireless sending module and an encrypted circuit; each wireless voice receiving system comprises a Lorenz chaotic response system circuit, a step-up interface circuit, a controller, a wireless receiving module and a decrypting circuit; communications are carried out between the wireless voice sending system and the wireless voice receiving system of the first wireless voice secret communication system, and communications are carried out between the wireless voice sending system and the wireless voice receiving system of the second wireless voice secret communication system. Having characteristics like noise, chaotic signals are concealed; being extremely sensitive to initial conditions, the chaotic signals have long-term unpredictability and extremely strong intercepting and capturing resisting ability.
Owner:NORTHEASTERN UNIV LIAONING

Radar communication integrated signal generating and receiving method based on random step frequency OFDM (Orthogonal Frequency Division Multiplexing)

PendingCN113965441AGuaranteed low peak-to-average power ratio characteristicsGuaranteed high peak sidelobe ratio characteristicsCode division multiplexMulti-frequency code systemsRadarDemodulation
The invention discloses a radar communication integrated signal generating and receiving method based on random step frequency OFDM (Orthogonal Frequency Division Multiplexing). The radar communication integrated signal generating and receiving method comprises the following steps: generating a radar communication integrated signal; modulating the step frequency number of each pulse in each symbol of a first pulse; modulating user information to be communicated in a corresponding symbol of the second pulse; modulating the communication information in the third to last pulses; performing up-conversion on the baseband signal of each pulse according to the stepping frequency number, and sending the signal; receiving a radar communication integrated signal; performing down-conversion and demodulation on the first pulse to obtain the step frequency number of each pulse; performing down-conversion on the second pulse according to the stepping frequency number, and demodulating to obtain user information; and performing down-conversion on the third to last pulses according to the stepping frequency number, and performing demodulation to obtain communication information. According to the invention, one-point-to-multipoint communication in a radar communication integrated system can be realized, and confidential communication in a special system is realized by using the random step frequency of each pulse.
Owner:JIANGSU UNIV OF SCI & TECH

Authentication and encryption method for wireless network

ActiveCN100525182COvercoming confidentiality limitationsRealize two-way authenticationMultiple keys/algorithms usageSecure communicationBroadcast data
An authentication and security method for a wireless network. When a wireless terminal communicates with a wireless access point, a two-way certificate authentication is performed by an authentication server; after the two-way certificate authentication is successful, a unicast key negotiation is performed to realize secure communication of unicast data ; After the unicast key negotiation is successful, the wireless access point notifies the wireless terminal of the multicast / broadcast key to realize the secure communication of the multicast / broadcast data; the present invention solves the problem of security access control in the wireless network and overcomes the wireless Due to the limitation of confidentiality of data communication on the link, using public key cryptography technology, the two-way certificate authentication between the wireless terminal and the wireless access point is realized through the authentication server, which improves the security of access control; through dynamic unicast key negotiation The multicast / broadcast key notification completes the identification of each unicast key by each wireless terminal and the dynamic update of the unicast key and the multicast / broadcast key during the communication process, which realizes the confidential communication of data and increases the The difficulty of cracking.
Owner:CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products