Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

62results about How to "Strong encryption" patented technology

Biometric private key infrastructure

In accordance with an aspect of providing trust and authentication for network communications and transactions, a network infrastructure is provided that employs biometric private keys (BioPKI). Generally, Bio PKI is a unique combination of two software solutions that validate electronic user authentication: a state-of-the-art biometric signature system, and a digital signature for data integrity. The combined solution allows networked businesses and merchants such as financial institutions to ensure that user authentication is conducted in a trusted, secure fashion within standard network environments. In one example implementation, a biometric signature augments standard digital signatures by adding an automated, non-reputable user authentication capability to the existing digital signature process. In contrast to simple verification in a pure biometric-based system or digital signature/certificate environment, BioPKI uses a combination of biometric technology to access private keys in order to create digital signatures based on biometric authentication and industry-standard PKI technologies. In one example, BioPKI utilizes public key cryptography technology to encrypt the biometric signature information for transmission to the BioPKI server. The encryption packet contains several layers of internal information to ensure that the biometric signature is secured and validated prior to accessing the individual's private key.
Owner:AURORA WIRELESS TECH

Four-dimensional code, image identification system and method as well as retrieval system and method based on four-dimensional code

The invention discloses a pattern recognition system, which comprises a recognition diagram and recognition diagram data corresponding to the recognition diagram, wherein the recognition diagram is divided into three formats: an integral format recognition diagram, a semi-format recognition diagram and a pure image format recognition diagram; the integral format recognition diagram comprises a true color image area, a plurality of correction points, a data image and an ID number, wherein the correction points are arranged on four corners of the image area, the data image is arranged above the image area, and the ID number is arranged below the image area; the semi-format recognition diagram comprises the image area and a plurality of correction points, wherein the correction points are independently arranged on four corners of the image area; and the pure image format recognition diagram only comprises the image area. The pixels of a true color image are compressed and subjected to fault-tolerance processing so as to be converted into data, and the data is converted into the color image in a pixel code way, and the color image is published to an electronic document or a printed manuscript and is recognized into data after the color image is shot through a mobile phone and a computer to retrieve a network database so as to obtain corresponding information.
Owner:崔明 +1

Multi-wavelength fluorescent quantum dot anti-counterfeiting method

The invention discloses a multi-wavelength fluorescent quantum dot anti-counterfeiting method, comprising the following steps of (1) selecting a plurality of fluorescent quantum dots with various grain diameter types, wherein the fluorescence emission spectrums of the fluorescent quantum dots are evenly distributed within a near-infrared area; moreover, no wave bands overlap; and the type of the selected quantum dots is in a number equal to that of the ink boxes of a selected printer, and further is corresponding to the ink boxes of the selected printer one to one; (2) coding a plurality of fluorescent quantum dots of various types in each black bar according to bar codes through the utilization of the presence or absence of the fluorescence peaks of the fluorescent quantum dots of various type within a given wave band; (3) evenly mixing the quantum dots with ink in the corresponding printer ink box; and (4) printing an anti-counterfeiting marker with the ink containing the quantum dots in the step (3) so as to realize the highly anti-counterfeiting of commodities. The anti-counterfeiting marker made by such an anti-counterfeiting method has the advantages of high precision, good hiddenness and large information capacity, and further can be set and assigned by a manufacturer.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Self-networking system and method realizing reselection switch, self organization and self restoration

The invention discloses a self-networking system and method realizing reselection switch, self organization and self restoration. The system comprises a command and control center server, self-networking nodes and a user service terminal, wherein each self-networking node separately comprises a cellular base station system and a node terminal module, the cellular base station system is used for accessing the user service terminal and the node terminal module to realize a communication function of a wireless user; and the node terminal module serves as a connection and routing of the self-networking system to increase a corresponding routing judgment function. According to the self-networking system and method, the mobile communication base station technology is imported to the self-networking to make full use the advantages of the both to form a brand new network structure that can realize free switch and reselection and has self organization and self restoration functions, and the coverage can be greatly improved by using relatively small node power; the system has a huge authentication and encryption function to prevent the information from being broken and intercepted; and the cost of the user service terminal is greatly reduced, the network system capacity is greatly expanded, and the service access with large capacity and high bandwidth is satisfied.
Owner:苏州智铸通信科技股份有限公司

Encryption component applied to safe transmission of communication data

The invention provides an encryption component applied to safe transmission of communication data, which comprises an output encryption device connected with a memory to directly establish a data communication channel; in an initial state, a communication channel in the output encryption device is disconnected; the output encryption device comprises a cylindrical mounting shell with an opening inone end, an output contact, an output wire, an electromagnetic switch and a power generation winding; a circular end cover for sealing the mounting shell is coaxially and fixedly arranged at the opening of the mounting shell; the output contact is mounted on the base block in a floating manner and penetrates to the outer side end surface of the end cover; the output wire is connected between the memory and the output contact; the electromagnetic switch is connected to the output wire in series and can control on-off of the output wire, the power generation winding is fixedly installed on the end face of the inner side of the end cover and can generate power under the action of the butt joint decryption device to form the current with the set value, and the electromagnetic switch can be promoted to be turned on when the current with the set value of the power generation winding is small.
Owner:SHENZHEN POWER SUPPLY BUREAU

Display screen unlocking method, device and mobile terminal based on music identifier

The invention discloses a display screen unlocking method, device and mobile terminal based on a music identifier. The display screen unlocking method comprises the following steps: lightening the screen in a screen-locked state of the mobile terminal, and calling voice equipment to wait for receiving the audio numbered musical notation tune input by a user; receiving the audio numbered musical notation tune and identifying and converting into music digital numbered musical notation; and judging whether the music digital numbered musical notation is matched with the preset unlocking base identifier, wherein if so, the unlocking succeeds; otherwise, the unlocking failure is prompted. In the invention, the music numbered musical notation identifier is used as the unlocking base identifier, and the audio numbered musical notation tune is input in an input form of user speaking/singing, thus the unlocking experience of the user is effectively improved; when both hands of the user are busy, unlocking can be realized through the music numbered musical notation tune; meanwhile, a relatively long complicated password can be set, the password is convenient to memorize for specific users understanding music, and the science and technology impression as well as humanity is improved; and moreover, the encryption way is novel and unique and has strong encryption ability, and the password is hard to crack.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Method for establishing encrypted data transmission channel

The invention provides a method for establishing an encrypted data transmission channel, which comprises the following steps that firstly, a power input contact and a power output contact are matchedand butted, and a signal input contact and a signal output contact are matched and butted; then, the memory supplies power to the servo motor, the servo motor drives the magnet to perform centrifugalmotion and directly face the winding I and the winding II, and the magnet generates a changing magnetic field and performs relative cutting motion with the winding I and the winding II; then, the loading voltage of the servo motor is adjusted, the voltage value is a certain determined value matched with M and N, at the moment, the numerical value of the current generated in the first winding is M,the numerical value of the current generated in the second winding is N, the first electromagnetic switch and the second electromagnetic switch are turned on, and decryption is completed; and finally, the signal output wire is conducted, a communication channel in the output encryption device is conducted, and data in the memory is transmitted to the receiver through the signal output wire, the signal output contact, the signal input contact and the signal input wire.
Owner:安徽拔沃乎机电科技有限公司

Railway early warning system and early warning method based on mobile communication

The invention relates to a railway early warning system and an early warning method based on mobile communication. The railway early warning system comprises at least one main device and at least one slave device, wherein the main device is mounted on a locomotive head; the slave device is a portable mobile device; the main device comprises a power supply, a central processing unit, a keyboard, a display unit, an alarming unit and a point-to-point wireless communication unit, wherein the keyboard, the display unit, the alarming unit and the point-to-point wireless communication unit are respectively connected with the central processing unit; the slave device comprises a rechargeable battery, a central processing unit, a keyboard, a microphone, a display unit, a alarming unit and a point-to-point wireless communication unit, wherein the keyboard, the microphone, the display unit, the alarming unit and the point-to-point wireless communication unit are respectively connected with the central processing unit; and the point-to-point wireless communication unit of the main device and the point-to-point wireless communication unit of the slave device form a point-to-point wireless communication system. The invention solves the technical problem that the traditional railway early warning system only can be used for static fixed occasions. The invention can effectively prevent the occurrences of events, achieve random, automatic and fast early warning, and immediately stop or minimize the possible accidents.
Owner:XIAN XISHENG ELECTRONICS TECH

Multiple chaotic attractor time-sharing switching method and device for communication encryption

The invention relates to a multiple chaotic attractor time-sharing switching method and device for communication encryption, belongs to the technical field of communication encryption and solves the problem that the existing multiple chaotic attractor switching software system is unavailable for fast time-sharing switching of different chaotic system attractors. A switching chaotic system is built in an FPGA; subsystem control characters are entered to a single-chip microcomputer through a soft keyboard; the single-chip microcomputer converts the subsystem control characters into subsystem switching control signals which are transmitted to the FPGA; the FPGA selects one subsystem of the switching chaotic system according to the subsystem switching control signals; split-phase control characters are entered to the single-chip microcomputer through the soft keyboard; the single-chip microcomputer converts the split-phase control characters into split-phase switching control signals which are transmitted to the FPGA; the FPGA selects two of three phases or four phases of the selected subsystem for outputting, according to the split-phase switching control signals. Time-varying, diverse and complex chaotic signals are provided. Encryption effect and decryption resistance are improved, and multiple chaotic attractors can be subjected to fast time-sharing switching anytime.
Owner:HARBIN UNIV OF SCI & TECH

Multi-channel monitoring data compression method and system for industrial robot

The invention discloses a multi-channel monitoring data compression method and system for an industrial robot, and the method comprises the steps: fusing the multi-channel data only containing the local state information of the robot into a comprehensive signal with the global information through a cross-correlation function fusion algorithm according to the correlation characteristics between the monitoring data of each channel of the industrial robot, signal redundancy between data of each channel sensor is obviously reduced, and signal quality is improved. The comprehensive signal is encrypted and compressed through the composite chaos matrix and is transmitted to a remote maintenance center through a network, and the remote maintenance center recovers an original signal by using a secret key in combination with an orthogonal matching pursuit algorithm, so that safe and efficient transmission of the signal is realized. According to the invention, the efficiency and safety of signal transmission can be improved, the problem that a large amount of redundant mass vibration data generated by multi-channel real-time monitoring of the industrial robot cannot be safely and efficiently transmitted to a remote maintenance center is solved, and meanwhile, a data basis is provided for fault diagnosis and health assessment of the industrial robot.
Owner:XI AN JIAOTONG UNIV

Method for improving encrypted data security transmission level

The invention provides a method for improving the security transmission level of encrypted data, which comprises the following steps that firstly, a decryption cylinder is inserted into a mounting cylinder and matching butt joint is completed, an output component and an input component are connected in a butt joint manner, and a decryption mechanism is over against an encryption switch; thereafter, the decryption mechanism is operated, a first sleeving cylinder in threaded connection fit with the decryption cylinder moves close to a second sleeving cylinder, a supporting arm supports a triggering arm and forces the triggering arm to be unfolded, the triggering arm penetrates through a through groove from a folded state to be switched into an unfolded state, meanwhile, the triggering arm slides through a channel to enter an inner cavity and pushes and presses an ejector rod, and an encryption switch is switched into an opened state from a disconnected state; and finally, the interior ofthe output component is conducted, the communication channel in the encryption socket is conducted, the data is transmitted to the memory by the computer through the output component and the input component in sequence to perform encryption transmission on the data. The significance is that only when all encryption switches are turned on, the communication channel can be conducted, the encryptionperformance is strong, and matching and butt joint are facilitated.
Owner:安徽拔沃乎机电科技有限公司

Special socket component for improving data encryption level

The invention provides a special socket component for improving a data encryption level. The special socket component comprises a mounting cylinder, an output component and a plurality of encryption switches, wherein the output component and the encryption switches are both mounted in the mounting cylinder; the encryption switches are connected to the output component in series, and the multiple encryption switches are turned on at the same time to turn on the output component; the encryption switches are turned off in an initial state; the mounting cylinder is composed of a mounting cylinderI and a mounting cylinder II which are coaxially and fixedly connected; one end of the mounting cylinder I is a fixed end, and the other end of the mounting cylinder I is a connection end; one end ofthe mounting cylinder II is a fixed end, and the other end of the mounting cylinder II is connected with a connection end; the connection end of the mounting cylinder I is coaxially and fixedly connected with the connection end of the mounting cylinder II; the output component is mounted at the fixed end of the mounting cylinder I; and the encryption switches are mounted at the fixed end of the mounting cylinder II. The beneficial effects are that the structure is compact, the principle is simple and reliable, on-off of communication channels in the encryption socket is controlled through theplurality of switches, only when all switches are turned on, the communication channels can be turned on, and the encryption performance is high.
Owner:安徽拔沃乎机电科技有限公司

Encrypted data port for constructing transmission channel special for encrypted data

The invention provides an encrypted data port for constructing a transmission channel special for encrypted data. The encrypted data port includes an encryption socket connected with a computer, wherein an internal communication channel is disconnected under the initial state of the encryption socket, and a decryption plug connected with a memory, wherein the communication channel in the decryption plug is conducted. The decryption plug decrypts the encryption socket, so that a communication channel in the encryption channel is switched from disconnection to connection, data in the computer istransmitted into the memory through the encryption socket and the decryption plug, and the encryption socket comprises a mounting cylinder, an output component and a plurality of encryption switches;the decryption mechanism comprises a decryption cylinder used for being inserted into the mounting cylinder, an output component used for being in butt joint with the input component, and a decryption mechanism used for decrypting the encryption switch and switching the encryption switch from closing to opening; the beneficial effects of the invention are that the interior of the encryption socket controls the on-off of the communication channels in the plurality of switches, only when all switches are turned on, the communication channels can be turned on, and the encryption performance is high.
Owner:安徽拔沃乎机电科技有限公司

Function parameter data transmission encryption method, system and device and readable storage medium

The invention discloses a function parameter data transmission encryption method, which comprises the following steps of: a function to be transmitted is acquired, and parameters except the last bit in the function are encrypted to obtain a desData value; in the parameter data transmission process, a data sender transmits all parameters of the function based on the last bit parameter of the function, and during transmission, the last bit parameter is spliced and combined to obtain a transmission character string; and after the transmission is finished, a data receiver receives the function tobe transmitted and splits and decrypts the transmission character string to obtain the last bit parameter after split and decryption. All the parameters can be encrypted in a unified mode, and all theparameters are encrypted at a time; cyclic redundancy check + timestamp and digital signature encryption and symmetric encryption algorithms are adopted, so that the encryption speed is high, and thedata transmission efficiency is not influenced; the related encryption algorithm is a symmetric encryption algorithm, random matching is carried out according to an agreed identifier without limitation, the encryption strength is higher, and the encryption algorithm is not easy to crack.
Owner:ZHEJIANG CANGNAN INSTR GRP CO LTD

Wide area network intelligent home remote control system and working method thereof

ActiveCN113452589AEasy to useTo achieve the purpose of distance educationData switching by path configurationTotal factory controlData displayHome use
The invention relates to the technical field of smart home remote control, and discloses a wide area network smart home remote control system and a working method thereof. On the one hand, the working monitoring data of a household electrical appliance is acquired through an electrical appliance monitoring end, and the working monitoring data is transmitted to a remote control end for data display through a home control center equipment and a wide area network, so that a user can remotely sense the current use condition of the household electrical appliance, and then a correct electrical appliance operation instruction is issued; on the other hand, electric appliance control information generated by operation can be transmitted to an electric appliance control end for control execution through the home control center equipment and a wide area network, and finally, the purpose of remotely controlling the home electric appliances is achieved, so a user can control the home electric appliances anytime and anywhere, and home use is facilitated. The method is particularly suitable for scenes where left-behind children need to be limited to use household appliances (such as televisions and the like) in a limited mode, body health of the children is guaranteed, the pain point of current children education is solved, and good practicability and expansibility are achieved.
Owner:张 挺
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products