Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

212results about How to "Realize secure transmission" patented technology

Method and system for identity verification of digital certificate based on TEE (Trusted Execution Environment)

ActiveCN105429760AEnsure true willEnsure that the identity verification process can reflect the true willUser identity/authority verificationPasswordPersonal identity verification
The invention discloses a method for identity verification of a digital certificate based on a TEE (Trusted Execution Environment). The method comprises pre-configuration of a digital certificate system through a terminal, a digital certificate signature process and a digital certificate signature verification process. The method is characterized in that the terminal is provided with the TEE; the digital certificate signature process is carried out on the terminal and is used for utilizing a private key of the digital certificate to sign for a user request; the digital certificate signature verification process is used for authenticating identity of a requested user, and the authentication method comprises verification of validity and effectiveness of the digital certificate and integrity and correctness of the signature, wherein the digital certificate signature process is carried out under the TEE; the sensitive information, such as a user key, identity information, biological characteristic information and password information, is stored through a secure storage module, so that the problems that the signature process is carried out in REE and the sensitive information of the user is stored under the REE environment to cause privacy disclosure and stolen hidden danger of property in the prior art are avoided.
Owner:神州融安数字科技(北京)有限公司

Method and system for implementing authentication and data safe transmission

The invention discloses an authentication and safe transmission of data realizing method. A terminal safety device and an authentication terminal after being connected negotiates to have a same data to be used as a root key, and at the same time negotiates to have a same dispersion factor and a same algorithm, the negotiated root key and dispersion factor generate a same session key used as a symmetrical key by using the algorithm, and then, safety authentication and data encryption and decryption can be performed and safety data interaction between the two ends can be realized. The invention also discloses a system for realizing authentication and safe transmission of data, and the system comprises a terminal safety device, an authentication terminal and an authentication server. According to the invention, randomness of the session key for data encryption transmission can be assured, even though a session key is decrypted, the safety of the whole system can be assured, and at the same time, atom manipulation for safety authentication and safe transmission of data can be realized for avoiding that in the current authentication process, once a password is verified by the terminal safety device, limits of authority are totally released and potential safety hazard is generated, therefore, authentication safety is improved greatly.
Owner:BEIJING HUADA ZHIBAO ELECTRONICS SYST

Physical layer secure transmission method for resisting information eavesdropping of eavesdropping node

The invention discloses a physical layer secure transmission method for resisting information eavesdropping of an eavesdropping node. The physical layer secure transmission method comprises the steps that: 1) a source node and a target node sequentially send a training sequence before the beginning of information transmission, so that the source node and the target node estimate equivalent channel information h<n, k> from the source node to the target node, wherein n is contained in {1, ... , Nr}, k is contained in {1, ... , Nt}, Nt is antenna number set by the source node, and Nr is antenna number set by the target node; 2) the source node encodes to-be-transmitted data, obtains a to-be-transmitted symbol and an antenna serial number for transmitting the to-be-transmitted symbol, then adds artificial noise into the to-be-transmitted symbol, and transmits the to-be-transmitted symbol added with the artificial noise to the target node through a selected antenna; 3) and the target node receives the symbol transmitted by the source node, decodes the symbol transmitted by the source node by means of a maximum likelihood decoder, and completes physical layer secure transmission of information. The physical layer secure transmission method can achieve physical layer secure transmission of the information.
Owner:XI AN JIAOTONG UNIV

Collaboration network power distribution method based on artificial noise under nonideal channel estimation condition of collaboration channel

The invention discloses a collaboration network power distribution method based on artificial noise under a nonideal channel estimation condition of a collaboration channel. The method comprises the steps that S1, a legal receiving end sends pilot sequences to a transmitting end of an transmitting source, and a collaboration jammer; S2, the transmitting end receives the pilot sequence and carries out ideal channel estimation, and the collaboration jammer receives the pilot sequence and carries out nonideal channel estimation; S3, the transmitting end and the collaboration jammer design respective transmitting signals; S4, the transmitting end and the collaboration jammer transmit signals to the legal receiving end and an eavesdropping end at the same time; S5, the optimum transmitting power distribution ratio and the maximum safe transmission rate under the nonideal channel estimation condition of the collaboration channel are calculated; S6, the optimum transmitting power distribution ratio and the maximum safe transmission rate under an ideal channel estimation condition of the collaboration channel are calculated; and S7, the maximum safe transmission rates under the nonideal channel estimation condition and the ideal channel estimation condition are compared. According to the collaboration scheme provided by the method, the condition that an error exists in the channel estimation method of the collaboration channel is taken into full consideration, and the practical power distribution scheme for realizing system safety is proposed.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Rail transportation ticket-card processing intelligent system and data encryption auditing method

The invention discloses a rail transportation ticket-card processing intelligent system, which comprises a sorting center and an automatic ticketing system for a plurality of rail transportation lines. The sorting center comprises a set of service computers, and the automatic ticketing system comprises a set of equipment computers and a ticket-card processing intelligent terminal connected with the equipment computers; and the card processing intelligent terminal is used for processing of ticket transaction flow, issuing of single ticket transaction keys, online authentication of value-stored ticket recharge and generation and verification of transaction logs. The sorting center also comprises an encryption computer which is connected with the ticket-card processing intelligent terminal and is used for receiving an encryption certification request of the ticket-card processing intelligent terminal; and the equipment computers are used for transmitting service commands to the ticket-card processing intelligent terminal and receiving the service command processing result. The modification of the ticket-card processing service is realized through the online update function of the parameters or ticket-card processing programs and the maintenance cost due to the updated card processing programs is reduced. The invention also discloses a data encryption auditing method.
Owner:NANJING PANDA INFORMATION IND +1

Null-shift-keying-based physical layer safety transmission method in multi-input single-output system

ActiveCN104270227ARealize secure transmissionOvercome the shortcoming that security is restricted by the channelSpatial transmit diversityError prevention/detection by diversity receptionMulti inputPrecoding
The invention discloses a null-shift-keying-based physical layer safety transmission method in a multi-input single-output system. The physical layer safety transmission method includes the steps that (1) the multi-input single-output communication system comprises a source node, a destination node and a wiretapping node, M transmitting antennas are assembled on the source node, and the destination node and the wiretapping node are each provided with an antenna; (2) information of the source node is grouped, wherein bit grouping is carried out on bit information sequences to be transmitted through the source node according to the same bit length; (3) null shift keying is carried out, wherein bit information contained in information bit groups is mapped to the transmitting antennas with the corresponding serial numbers through the source node, and the source node transmits antenna serial numbers to serve as carriers of information source information through null shift keying; (4) precoding processing is carried out, wherein precoding processing is carried out on symbols transmitted by the transmitting antennas through the source node. According to the null-shift-keying-based physical layer safety transmission method, limitation of a single-antenna system to the physical layer safety can be broken, the structure of a transceiver can be simplified, and defects in a traditional multi-antenna physical layer safety transmission method are overcome.
Owner:PLA UNIV OF SCI & TECH

Unapproved construction information high precision acquisition method based on mobile terminal

The invention discloses an unapproved construction information high precision acquisition method based on a mobile terminal, and relates to the information acquisition technology field. The unapproved construction information high precision acquisition method comprises steps: processing of line data, spatial data displayed in the mobile terminal, and acquisition of unapproved construction information. The unapproved construction information high precision acquisition method is advantageous in that a method of acquiring, integrating, and pushing information for location awareness in different environments is used to effectively support integration of audio and video information, image information, position information, and attribute information by taking place name and address data as a basis, and the multidirectional comprehensive acquisition and collection of the unapproved construction information is realized; during the data acquisition, automatic acquisition is carried out, and range value precision is high, and a range value is precise to a centimeter level, and therefore the high precision position locating and the acquisition of the related data are realized; before the data pushing, the safety of the data is guaranteed by adopting an information encryption pushing strategy based on the position and a mobile terminal data strategy, and therefore safe transmission of a line and red line data during a mobile inspection process is realized, and the currency of the unapproved construction data acquisition is improved.
Owner:星际空间(天津)科技发展有限公司

Security transmission method based on cooperation interferences in multi-cell network

The invention discloses a security transmission method based on cooperation interferences in a multi-cell network. It is assumed that a base station BS 1 and a target user Rx1 in a first cell are legal communication parties; the BS1 transmits a secrete message to the Rx1; in order to improve the security of the secrete message, the BS1 builds a cooperation relationship with the base station of other cell; an eavesdropping node is interfered by using the artificial noises AN generated by the cooperation base station; moreover, the cooperation base station adjusts the powers between usable signals and AN signals; on the basis of ensuring security performance, the service quality assurance is provided for the users of the local cell as much as possible; under a condition that a transmitter only knows the statistic channel information of the eavesdropping node, the secrete message is transmitted securely in the multi-cell network; further, on the basis of ensuring the security performance, the target users of the cooperation base station are ensured to obtain reliable service quality as much as possible; in consideration of the dynamic changes of channel gains in a wireless fading environment, the cooperation scheme provided by the invention is featured by dynamic self-adaption.
Owner:江苏星地通通信科技有限公司

Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal

The invention discloses a Bluetooth communication authentication request, receiving and communication method, a mobile terminal and an equipment terminal, and the Bluetooth communication authentication request and communication method comprises the steps: carrying out the Bluetooth scanning with the equipment terminal, and establishing a communication link on a link layer; obtaining an equipment end public key; performing ECDH key exchange, and generating an ECDH Base AES Key symmetric key K; acquiring a user password, and sending the user password to the equipment end; after the equipment terminal passes user authentication, performing data communication with the equipment terminal, and disconnecting connection after communication is completed; in the user password sending process and thedata communication process, an AES encryption channel is adopted for encryption and decryption transmission, and a secret key of an AES encryption function is a symmetric secret key K. According to the method, the secret keys of the two communication parties are stored in the application layer, detection and verification are carried out on the application layer through the ECDH secret key exchange technology, it is guaranteed that the secret keys are stored in a protected thread, and data cannot be accessed by other malicious programs.
Owner:JINAN UNIVERSITY

A method for selecting secure transmission of unidirectional full-duplex MIMO relay antennas

A method for selecting safe transmission of one-way full-duplex MIMO relay antenna is disclosed. The full-dual MIMO relay system comprises a source, a relay, a destination node and an eavesdropper. The source, the relay, the destination node and the eavesdropper are configured with multiple antennas. The transmission of information is completed in one time slot, comprising the following steps: acquiring the number of transmitting antennas of the source and the number of receiving antennas of the relay; obtaining the number of transmit antennas for the relay; based on the number of transmittingantennas of the source, the number of receiving antennas of the relay and the number of transmitting antennas of the relay, obtaining the reception signal-to-noise ratio of the destination and the reception signal-to-interference-noise ratio of the eavesdropper; obtaining the instantaneous safety capacity of the full-duplex MIMO relay system based on the received signal-to-noise ratio of the destination and the received signal-to-interference-noise ratio of the eavesdropper. By selecting the optimal transmitting and receiving antennas, the method of the invention not only optimizes the signal-to-noise ratio of the relay reception, but also takes into account the weakening of the signal-to-interference-to-noise ratio of the eavesdropper reception, thereby effectively improving the safety capacity of the whole system.
Owner:HUAQIAO UNIVERSITY

Secure transmission method using fountain code for multiple feedbacks

InactiveCN108259138ASecure transmissionWithout sacrificing transmission reliabilityChannel coding adaptationComputer hardwareReliable transmission
The invention belongs to the technical field of communications, and particularly relates to a secure transmission method using a fountain code for multiple feedbacks. According to the scheme of the invention, a fountain code encoding and decoding process is updated by using the feedback, the purpose of continuously accumulating the legitimate channel advantages can be achieved, the gap between a legitimate receiver and the eavesdropper translation rate can be maximized, and thus a relatively more secure transmission can be implemented. Compared with a common fountain code security transmissionmethod, the scheme of the invention can be tightly coupled with channels, the entire encoding and decoding process is operated on the basis of guaranteeing the reliable transmission, and the transmission reliability cannot be sacrificed due to the pursuit of security performance; moreover, only a small number of feedbacks are needed, and the phenomenon of channel congestion caused by a large number of feedbacks similar to that of the traditional communication cannot occur; and the requirement for channel conditions is low, and strong adaptability and practicability can be achieved in both wired and wireless environments.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products