Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

42results about How to "Satisfy confidentiality" patented technology

Internet of Things data access control method and system based on block chain and IBE algorithm

The invention discloses an Internet of Things data access control method and system based on a block chain and an IBE algorithm. A private key generation center PKG carries out system initialization, and constructs an alliance chain; Internet of Things equipment acquires data, encrypts the data to obtain a ciphertext, and sends the ciphertext to the Internet of Things gateway; the Internet of Things gateway sends the ciphertext to an Internet of Things system cloud platform or a local database for storage; a hash value corresponding to the ciphertext is generated, and the ciphertext identifier and a key value pair corresponding to the hash value are stored in the block chain; the PKG generates a private key; a data requester initiates a data request transaction on a block chain, an access control contract deployed on the block chain verifies validity of a data request, the PKG establishes a secure connection with the data requester to share a private key after verification is passed, and the data requester decrypts encrypted data by applying an IBE decryption algorithm to obtain request data. According to the invention, safe and credible fine-grained access control in an Internet of Things environment can be realized, and confidentiality, integrity and availability are satisfied.
Owner:NANJING UNIV OF POSTS & TELECOMM

Intelligent security chip signature information transmission method and system based on 2-dimensional bar code

The invention relates to an intelligent security chip signature information transmission method and system based on a 2-dimensional bar code. The 2-dimensional bar code is generated by the following steps: an intelligent security chip is inserted into a terminal device; the intelligent security chip is used to put a signature on the original data and thus signature value information is obtained; and the terminal device assemblies the original data, the signature value information and a message verification code to generate a 2-dimensional bar code, and displays the 2-dimensional bar code. Scanning authentication of the 2-dimensional bar code comprises the following steps: an application scans the 2-dimensional bar code, parses the data of the 2-dimensional bar code so as to obtain the to-be-authenticated data, and then sends the to-be-authenticated data to an application background; an authentication center verifies the to-be-authenticated data, and sends a verification result back to the application through the application background. With application of the intelligence security chip signature information transmission method and system based on a 2-dimensional bar code, in an intelligent card identity authentication application system, the problem of poor data communication between an intelligent card and a background system due to unavailable card reading devices is solved, so that comparative transmission of the signature information of the intelligent card is fulfilled without using a particular intelligent card reading device.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Layered PCE based multi-domain optical network secure light path establishment protocol

The invention discloses a layered PCE based multi-domain optical network secure light path establishment protocol. Aiming at the problems of security problem and comprehensive efficiency existing in a multi-domain optical network light path establishment process, a new GO-PCE (Global Optimizing secure light-path protocol based PCE in multi-domain optical network) is designed by combining with a trust model and a key management scheme, adopting a globally optimized multi-domain trusted path selection, usable wavelength calculation and wavelength distribution strategy, and utilizing a TLS based bidirectional identity authentication, TCP-AO based source authentication, identity cryptography based encryption and digital signature technology and a Path-Key based privacy protection mechanism. The secure service requirements such as confidentiality, completeness, authenticity, non-repudiation, freshness and privacy can be met; compared with an SD-PCE and pH-PCE light path establishment protocols, the layered PCE based multi-domain optical network secure light path establishment protocol has relatively low blocking rate and relatively short light path establishment time delay.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Method of enhancing UVA (Unmanned Aerial Vehicle) MANET network security

The invention discloses a method of enhancing UVA (Unmanned Aerial Vehicle) MANET network security in the field of wireless communication technology. The method of enhancing UVA MANET network securitycomprises the specific steps as follows: S1, performing bidirectional identity authentication between UVA nodes, to be specific, S1.1, sending an identity authentication request to a UVA node A by aUVA node B, S1.2, responding to the identity authentication request of the UVA node A by the UVA node B, and S1.3, sending the identity authentication request to the UVA node A by the UVA B, and S1.4,responding to the identity authentication request of the UVA node B by the UVA node A; S2, negotiating symmetric master keys; S3, generating a session key; and S4, generating a digital signature, tobe specific, signing a message M and then sending the message signature sigma and the message M to the UVA node B by the UVA node A, and verifying the correctness of the signature by the node B. By adoption of a form of double keys, a key trusteeship problem and possibility of revealing a system private key due to inverse derivation of a malicious node can be well overcome through a negligible calculated amount.
Owner:XIDIAN UNIV

Certificateless parallel key isolation signcryption method

The invention discloses a certificateless parallel key isolation signcryption method. Two different and independent assistors are imported in the configuration, the two assistors help a signcryption user and an unsigncryption user to generate initial private keys, temporary private keys can be alternately updated without affecting each other, and even the frequent update of the temporary private key of the signcryption user does not increase the leakage risk of the key of the assistor. The signcryption user performs signcryption on a plaintext by using his own private key and a public key of the unsigncryption user to generate a signcryption ciphertext; and after receiving the signcryption ciphertext, the unsigncryption user performs unsigncryption on the signcryption ciphertext by using his own private key and the public key of the signcryption user to restore the plaintext. According to the certificateless parallel key isolation signcryption method disclosed by the invention, a key isolation mechanism is imported into a certificateless signcryption scheme, which not only reduces the computation and communication costs, but also satisfies the characteristics of confidentiality, non-repudiation, parallelism and strong key isolation and the like, and also supports frequent key update without increasing the key leakage risk.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Broadcast encryption method capable of sending private information

The invention belongs to the technical field of the computer network secret communication, and specifically relates to a broadcast encryption method capable of sending private information. The method comprises the following steps: 1, setting a broadcast encryption system parameter, establishing a user set space, generating a public key and a main private key required by the broadcast system; 2, generating the private key for each use by a PKG and secretly sending the private key to the user; 3, encrypting the broadcasted information by using a symmetric encryption algorithm with key as K, and encrypting the communication information of the broadcaster and each user by using the symmetric encryption algorithm with the key as shown in description, and then broadcasting the generated ciphertext; and 4, after the user receives the ciphertext information, if the user belongs to the authorized user set, recovering the key K and the formula as shown in description by using the self private key and the broadcast ciphertext header Hdr, and respectively decrypting the corresponding encryption information to recover the plaintext information. By using the method disclosed by the invention, the confidentiality, the collusion attack resistance and the chosen plaintext attack security are satisfied at the same time; the method has the advantages of being low in expenditure and capable of sending the private information.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Certificateless signcryption algorithm suitable for VANETs

The invention provides a certificateless signcryption method suitable for VANETs, and the method comprises the following steps: S1, obtaining vehicle-mounted network system parameters from a vehicle-mounted network system by employing a system building algorithm, and building a vehicle user IDi; adopting a false identity generation algorithm and a partial private key generation algorithm to generate a vehicle user false identity, the validity period of the false identity and a partial private key; generating a vehicle user secret value by adopting a vehicle user secret key generation algorithm; a vehicle user sender generating a user message, generating a signcryption ciphertext based on the partial private key, the user public key and the secret value, and sending the signcryption ciphertext to a vehicle user receiver; and decrypting the signcryption ciphertext through a verification equation to obtain a decrypted user message, and finally judging whether the decryption is valid or not. The method is an efficient and safe certificateless signcryption algorithm, confidentiality, authentication, integrity, non-repudiation and privacy protection can be provided for information transmitted between vehicle communication units, and safety guarantee is provided for vehicle-mounted self-organizing network safety communication.
Owner:BAOJI UNIV OF ARTS & SCI

Sensor device for electric power measurement and control method

InactiveCN111044100AReal-time monitoring of environmental dataAvoid exceptionProgramme controlMeasurement devicesEngineeringElectric power
The invention belongs to the technical field of electric power measurement, and discloses a sensor device for electric power measurement and a control method. The control method comprises the steps of: detecting current and voltage data by means of current and voltage detectors; detecting temperature and humidity data by means of temperature and humidity sensors; performing infrared detection by using an infrared detector; setting electric power metering parameters, and setting normal threshold ranges of temperature, humidity and infrared radiation quantity; when the temperature, humidity andinfrared radiation quantity exceeds preset threshold values, performing corresponding adjustment by means of a pressure regulator, a heat dissipation device and a dehumidification device; analyzing power data by using an analysis program; and sharing the power data by means of a sharing program. The sensor device can monitor environmental data of the device in real time, avoids abnormality of thedevice caused by over-high temperature and humidity, can automatically adjust the environmental temperature and humidity data to ensure stable operation of the device, and can automatically alarm andinterrupt when encountering abnormality, and guarantees the operation safety of the device.
Owner:STATE GRID SHANDONG ELECTRIC POWER CO TAOXIAN POWER SUPPLY CO

Cave depot doorsill-free protection airtight door

The invention relates to a non-threshold protective airtight door of a cavern, which is characterized in that: a sealing beam operating handle and a door locking operating handle are arranged on the large door leaf, the door hinges and ground locks are respectively arranged on both sides of the large door leaf, and the small door leaf It is arranged at the lower part of the large door leaf, and the small door leaf is equipped with a key lock device and a small door lock; the large door leaf is provided with a sealing beam operating handle and a small door hinge, and the left side of the large leaf is provided with a large door hinge. There are door lock operation handles and door locks on both sides of the back, and a sealing beam device is installed at the bottom of the door leaf, and the door frame is pre-buried in the reinforced concrete wall. The present invention is a multi-functional protective airtight door integrating protective airtightness and two built-in locks. It adopts double doors and double locks. The two locks are opened by two different keys respectively, and the door can be opened. confidentiality. It solves the problems of various types of military material cavern doors, large space occupation, large number of doors, cumbersome opening and high cost.
Owner:ANSHAN HONGTUO MACHINERY MFG

A Certificateless Signcryption Algorithm Suitable for Vanets

The present invention proposes a certificateless signcryption method suitable for VANETs, ​​comprising the following steps: S1, adopting a system establishment algorithm to obtain vehicle network system parameters from the vehicle network system, and establishing a vehicle user ID i ;Use the fake identity generation algorithm and partial private key generation algorithm to generate the vehicle user fake identity, the validity period of the fake identity and part of the private key; use the vehicle user key generation algorithm to generate the vehicle user secret value; the vehicle user sender generates the user message, Based on the partial private key, user public key and secret value, a signcrypted ciphertext is generated and sent to the vehicle user receiver; the signcrypted ciphertext is decrypted by the verification equation to obtain the decrypted user message, and finally it is judged whether the decryption is valid. The invention is an efficient and safe certificateless signcryption algorithm, which can provide confidentiality, authentication, integrity, non-repudiation and privacy protection for information transmitted between vehicle communication units, and provide security guarantee for vehicle self-organizing network security communication .
Owner:BAOJI UNIV OF ARTS & SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products