Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

34results about How to "Secure data communication" patented technology

Data communication method and device, equipment and storage medium

The invention discloses a data communication method and device, equipment and a storage medium, and the method comprises the steps: obtaining to-be-communicated target data, and randomly generating a first encrypted data group comprising a first secret key; performing asymmetric encryption algorithm encryption on the first encrypted data set according to the first public key to obtain a second encrypted data set, the second encrypted data set comprising a salt value; performing symmetric encryption algorithm encryption on the target data according to the first encrypted data group to obtain ciphertext data; according to the second private key, the first secret key, the salt value and the ciphertext data, generating to-be-signed data, and encrypting the to-be-signed data to obtain signature data; and uploading the first key, the salt value, the ciphertext data and the signature data to a server. According to the method and the device, the non-repudiation of the data sender is ensured through the signature data, so that the legality of both communication parties is ensured, the data is prevented from being tampered, the replay attack is prevented, and the data communication can be performed more safely and efficiently on the basis of not reducing the encryption performance.
Owner:广州TCL互联网小额贷款有限公司

Multi-protocol multi-manufacturer internet of things equipment integration management and meteorological information release system

The invention discloses a multi-protocol multi-manufacturer Internet of Things equipment integration management and meteorological information releasing system, comprising a plurality of front-end acquisition modules, a plurality of front-end issuing modules, a protocol conversion module, a central processing module and a front-end acquisition module, wherein meteorological information is collected and transmitted to a protocol conversion module. The protocol conversion module receives the meteorological information and processes the meteorological information into a unified format for data transmission to the central processing module. The central processing module receives the data of uniform format for content supplementary processing and transmits the data of content supplementary processing back to the protocol conversion module. The conversion protocol moduleis used for receiving the data processed by the content supplement and reading the attributes of the data and matching theattributes of each front-end publishing module, and converting the data processed by the content supplement into a corresponding format and transmitting the data to the corresponding front-end publishing module. The front-end publishing module receives the data supplemented by the content and performs actions according to the data; Only one logical encoding of the data is required to match different network protocols.
Owner:河南知天科技有限公司

Data communication method and device, electronic equipment, upper computer and storage medium

The invention provides a data communication method and device, electronic equipment, an upper computer and a storage medium. The method comprises the steps of responding to a received operation command sent by an object, determining at least one input entity corresponding to the operation command, sending the at least one input entity to a lower computer, receiving feedback information sent by thelower computer for the at least one input entity, analyzing feedback information, and determining a target receiver adopting the same communication protocol as the lower computer; setting the targetreceiver as a default receiver; and achieving data communication between the upper computer and the lower computer by using the default receiver. The feedback information is analyzed; a target receiver with the same communication protocol is determined as the lower computer according to the feedback information, the target receiver is determined as the default receiver, so that data communicationbetween the upper computer and the lower computer is realized, a serial port communication system does not need to be reset, the cost is saved, and the technical effect of safe and reliable data communication between the upper computer and the lower computer is ensured.
Owner:GUANGZHOU SHIYUAN ELECTRONICS CO LTD +1

Data encryption method for remote communication of energy hosting platform system

ActiveCN107896231AMonitor energy consumption dataMonitor securityTransmissionRemote controlMaster station
The invention discloses a data encryption method for remote communication of an energy hosting platform system. The method comprises the steps of generation and management of a secret key, applicationand distribution of the secret key, and encryption and decryption processing of a communication message between a master station and a son station, wherein the secret key in the step of generation and management of the secret key is generated and managed by a master station encryption server, the way that one client has one secret key is used, and the step comprises generation and management of UK and generation and management of MK and OK; the application and distribution of the secret key comprises application of the UK and application of the MK and OK; and the encryption and decryption processing of the communication message between the master station and the son station comprises interrogation of the master station and remote control of the master station. By using the method providedby the invention, the condition that the communication packet between the master station and the son station is prevented from being illegally eavesdropped and tampered can be ensured, and thus the stable operation of the energy system of each son station in the hosting system is ensured.
Owner:江苏联宏智慧能源股份有限公司

Emergency command scheduling method and system for sudden environmental event

ActiveCN107171784AImproving the Ability to Respond to Sudden Environmental Pollution AccidentsReduce casualtiesEncryption apparatus with shift registers/memoriesPublic key for secure communicationCommunications securityPassword
The invention provides an emergency command scheduling method and an emergency command scheduling system for a sudden environmental event. The method comprises the steps as follows: a mobile terminal acquires a RAS public key from a network server, and stores the RSA public key in a local memory; the mobile terminal encrypts login information by using the RAS public key, and sends the encrypted login information to a network server, wherein the login information comprises a session key, an account name, a login password and hardware equipment information of the mobile terminal; after verifying authenticity of the login information, the network server generates the login information into a login certificate and a user ID, and stores the user certificate and the user ID into a database server; the network server encrypts the user certificate and the user ID by using the session key and then sends the encrypted user certificate and user ID to the mobile terminal; and session data and the user certificate are encrypted by using the session key and then sent to perform communication between the mobile terminal and the network server. The system is used for implementing the above method. According to the method and the system provided by the invention, data communication security between the mobile terminal and the server can be ensured.
Owner:珠海富鸿科技有限公司

Method for sending data and first control host

The invention relates to a data transmitting method and a first manipulation host. The method comprises the steps that a first Beidou time synchronization module is utilized to synchronize the first clock of the first manipulation host so that the determined time after completion of synchronization is obtained; the determined seed data uniquely corresponding to the determined time are obtained according to the stored agreed rules; data to be transmitted are encrypted by utilizing the determined seed data so that the determined non-feature code source is obtained; electro-optic conversion is performed on the determined non-feature code source so that the determined optical signal is obtained; and the determined optical signal is transmitted to a second manipulation host by utilizing optical fibers. Secure and high-efficiency data communication and command control between a far-end unattended radar station and a near-end control center can be effectively realized so that the method has the communication control means which is high in anti-interception capability, long in transmission distance, great in real-time performance, low in cost and easy to realize. Besides, practicality, reliability and stability are quite high so that the method has important social, economic and military meaning in enhancing automation level of national defense equipment of China.
Owner:SICHUAN JIUZHOU ELECTRIC GROUP

Emergency command and dispatch method and system for environmental emergencies

ActiveCN107171784BImproving the Ability to Respond to Sudden Environmental Pollution AccidentsReduce casualtiesEncryption apparatus with shift registers/memoriesPublic key for secure communicationCommunications securityDatabase server
The invention provides an emergency command scheduling method and an emergency command scheduling system for a sudden environmental event. The method comprises the steps as follows: a mobile terminal acquires a RAS public key from a network server, and stores the RSA public key in a local memory; the mobile terminal encrypts login information by using the RAS public key, and sends the encrypted login information to a network server, wherein the login information comprises a session key, an account name, a login password and hardware equipment information of the mobile terminal; after verifying authenticity of the login information, the network server generates the login information into a login certificate and a user ID, and stores the user certificate and the user ID into a database server; the network server encrypts the user certificate and the user ID by using the session key and then sends the encrypted user certificate and user ID to the mobile terminal; and session data and the user certificate are encrypted by using the session key and then sent to perform communication between the mobile terminal and the network server. The system is used for implementing the above method. According to the method and the system provided by the invention, data communication security between the mobile terminal and the server can be ensured.
Owner:珠海富鸿科技有限公司

Data transmitting method and first manipulation host

The invention relates to a data transmitting method and a first manipulation host. The method comprises the steps that a first Beidou time synchronization module is utilized to synchronize the first clock of the first manipulation host so that the determined time after completion of synchronization is obtained; the determined seed data uniquely corresponding to the determined time are obtained according to the stored agreed rules; data to be transmitted are encrypted by utilizing the determined seed data so that the determined non-feature code source is obtained; electro-optic conversion is performed on the determined non-feature code source so that the determined optical signal is obtained; and the determined optical signal is transmitted to a second manipulation host by utilizing optical fibers. Secure and high-efficiency data communication and command control between a far-end unattended radar station and a near-end control center can be effectively realized so that the method has the communication control means which is high in anti-interception capability, long in transmission distance, great in real-time performance, low in cost and easy to realize. Besides, practicality, reliability and stability are quite high so that the method has important social, economic and military meaning in enhancing automation level of national defense equipment of China.
Owner:SICHUAN JIUZHOU ELECTRIC GROUP

Method, device and readable storage medium for detecting false data injection attack

The present application discloses a method, device and computer-readable storage medium for detecting false data injection attacks. Applied to a three-layer smart grid framework consisting of PMU layer, local aggregation layer, and control layer, the local aggregation layer pre-trains multiple fuzzy neural network models that are independent of each other and are used to detect false data in the aggregated data of the local aggregator; Receive the measurement data and estimated state values ​​sent by each local aggregator and input them into the corresponding fuzzy neural network model to obtain the false data information of each local aggregator; if there is at least one target local aggregator whose false data value is greater than the threshold, then determine the bus Suffering from false data injection attacks; the local aggregator aggregates the measurement data collected by the PMUs in the corresponding area and performs state estimation to obtain the estimated state value, and sends the data to the control layer after the identity legality verification request is passed. This application can effectively resist false data injection to attack the grid and ensure the security of grid communication.
Owner:CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products