Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

177results about How to "Strong resistance to attack" patented technology

Security network invasion detection system suitable for virtual machine environment

InactiveCN101309180AGuaranteed security featuresCentralized control of intrusion detection rulesData switching networksCommunication controlA domain
The invention discloses a safe network intrusion detection system which is applicable to the virtual machine environment and includes a server inter-domain communication control module, an intrusion detection engine module, an intrusion response control module in the intrusion detection virtual machine, a client inter-domain communication control module, a domain spilt event detector module and a domain split response control module in the detected application virtual machines. According to the problem that the safety of the virtual machine system of the virtual machine needs to be improved; the current intrusion detection system cannot realize the purpose, the safe network intrusion detection system considers the layering structure of the virtual machine network sufficiently and realizes the intrusion detection protection of the virtual machine system in the internal network based on the virtual machine; the safety of the virtual machine applied in the production practice activities is improved; meanwhile, the separation of the intrusion detection system and the protected system is realized based on the separation safety property of the virtual machine; compared with the traditional network intrusion detection system, the safe network intrusion detection system has better safety and reliability.
Owner:HUAZHONG UNIV OF SCI & TECH

Three-dimensional Arnold mapping-based image grouping encryption method

The invention relates to a three-dimensional Arnold mapping-based image grouping encryption method, which is characterized by comprising the following steps: firstly, adopting an Amold mapping extended to three dimensions to construct an S box; then, performing sorting scrambling on a chaotic sequence generated by a Chebyshev mapping; and finishing the encryption operation through multi-iteration. The theoretical analysis and experimental result prove that the three-dimensional Arnold mapping-based image grouping encryption method has the advantages of large key space, high sensitivity, high speed, excellent safety, strong attack resistance, and the like. Compared with other similar methods, the three-dimensional Arnold mapping-based image grouping encryption method guarantees the safety and has higher speed, and is more applicable for graphic data encryption. The main superiority of the method is that: the method has enough key space to resist an exhaustive attack, and the change of a key at any bit can completely change an initial value and the parameters of the chaotic sequence. Therefore, the sensitivity of the key is greatly improved; any useful information cannot be exposed by the statistical property; and the relativity of adjacent pixels of an intensity diagram is small and the attack resistance is strong.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Image encryption method based on Feistel network and dynamic DNA encoding

The invention provides an image encryption method based on a Feistel network and dynamic DNA encoding. The method comprises the following steps: computing a Hash value of an original plaintext image by using a Keccak algorithm, and taking the Hash value as an initial value of a hyper-chaotic Chen system, generating a Hill encryption matrix by using a chaotic sequence generated by the hyper-chaoticChen system so as to replace pixels of an original image; realizing image pixel value diffusion by using the DNA encoding operation as a F function of the Feistel network, and a DNA sequence base asa key of the Feistel network; and performing further diffusion through ciphertext feedback. Through three turns of chaotic scrambling-DNA encoding-Feistel conversion-DNA decoding, the ciphertext randomness and attack resistance are stronger, the scrambling conversion of the image pixel location and the diffusion of the pixel value are realized, and the encryption turn is reduced due to repeated scrambling and DNA encoding and decoding. Through the image encryption method provided by the invention, the image can be effectively encrypted, the plaintext sensitivity is strong, the plaintext attack, the differential attack and the statistical attack can be effectively resisted
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Device for establishing network isolated channel and method thereof

The invention relates to a device for establishing a network isolated channel and a method thereof. A safe communication channel is established between two or multiple network devices through a network channel isolating device. The network channel isolating device is provided with an internal network interface and an external network interface. The internal network interface is connected with an internal network device. The external network interface is connected with an external network device. The network device which is connected with the internal network interface is protected by the network channel isolating device. A set of network devices protected by the network channel isolating device is called as a network channel isolating device protection domain. Host computers in different domains can communicate safely. By establishing a virtual network isolated channel through a public network among different geographic locations and by adopting an encryption algorithm recommended by the State Secrecy Bureau to conduct high-strength encryption to communication data, any third party cannot effectively decrypt the encrypted data and the communication data cannot be falsified; and the problem that different departments of small and medium enterprises cannot communicate safely through the public network is solved.
Owner:周伯生

Endogenous safe user access authentication management system and method

ActiveCN110691107AReduce Cybersecurity RisksReduce security risksTransmissionMessage typeParallel processing
The invention discloses an endogenous safe user access authentication management system and method. The method comprises the following steps: an input message discrimination distributor discriminatesthe message type of input excitation information to determine whether mimicry decision needs to be carried out or not, directly sends the input excitation information to a non-mimicry decision function executor to be processed when mimicry decision does not need to be carried out, and sends the input excitation information to a mimicry input agent and a distributor when mimicry decision needs to be carried out; the mimicry input agent and the distributor are copied and distributed to a specified access authentication management system executor according to the distribution strategy; the specified execution body executes parallel processing operation and outputs an execution result to the mimicry decision module; the mimicry decision module operates a credible result discrimination algorithm to calculate credible output according to each execution result and sends the credible output to the mimicry output agent module; and the output message combiner is used for receiving the trusted output sent by the mimicry output agent module or the output of the non-mimicry judgment function execution body and carrying out external output response.
Owner:NANJING REDMATRIX NETWORK SECURITY TECH R & D INST

Color image lossless encryption method on basis of two-dimensional discrete wavelet transform and spatiotemporal chaos

The invention relates to a color image lossless encryption method on the basis of two-dimensional discrete wavelet transform and spatiotemporal chaos. The color image lossless encryption method comprises the following steps: separating three primary color components of a color plaintext image to obtain matrices IR0, IG0 and IB0; by utilizing an external key and combining the plaintext image, generating spatiotemporal chaos system parameters and initial values and carrying out iterative operation on a spatiotemporal chaos system to obtain key streams K1 and K2; carrying out two-dimensional discrete wavelet transform on the components IR0, IG0 and IB0 to obtain three groups of sub-bands; utilizing the key stream K1 to respectively carry out disorder processing on the three groups of sub-bands and compressing the sub-bands; respectively carrying out two-dimensional discrete wavelet transform on each group of processed sub-bands to obtain a wavelet encrypted image I1; utilizing the key stream K2 to carry out diffusion treatment on the image I1 to obtain a final ciphertext image C. Compared with an existing image encryption method, the color image lossless encryption method provided by the invention has the advantages of high safety, good encryption effect, lossless information, high encryption speed, high attack resistance and the like and can be widely applied to the fields of medicine, biological gene, military and the like.
Owner:HENAN UNIVERSITY

Method and system for file transparent encryption and decryption of Android platform

The invention discloses a method for file transparent encryption and decryption of the Android platform. The method includes the steps: selecting a route of a folder where a file needed to be protected is positioned, and setting passwords; respectively generating an encrypted route dictionary list and an authentication file according to the route and the passwords input by a user; scanning the encrypted route dictionary list, if an operating system is started for the first time, subjecting the protected file to first-time initialization encryption according to list items, and then carrying out the next step; when the user triggers a screen unlocking event, receiving a passphrase input by the user, comparing the passphrase subjected to hash algorithm with the authentication file generated at the step two, and if the passphrase is not matched with the authentication file, judging that unlocking fails; if the passphrase is matched with the authentication file, subjecting the passphrase to sha 1 algorithm to generate a secret key, and storing the secret key; calling the secret key for encryption and decryption of the file. The invention further discloses a system for file transparent encryption and decryption of the Android platform. File protection is realized on the premise of small interferences to user operations.
Owner:SUQIAN XINCHAO INFORMATION TECH CO LTD

Session key negotiation method and intelligent secret key device

The invention discloses a session secret key negotiation method and an intelligent secret key device, and belongs to the information security field. The method includes the steps of: receiving a third APDU instruction from a host computer by the intelligent secret key device and returning negotiation public key to the host computer; receiving a fourth APDU instruction from the host computer, and returning a signature result to the host computer; receiving fifth APDU instruction from the host computer by the intelligent secret key device, analyzing the fifth APDU instruction to obtain encryption data, using negotiation private key to decrypt the encryption data, and obtaining second filling data; judging whether a filling format of the second filling data is a pre-set filling format, if so, extracting the data with the pre-set length from a pre-set position of the second filling data as a session secret key, and returning the successful response to the host computer, otherwise returning abnormal information to the host computer. The session secret key generated by the method has strong anti-attack capability. After the information transmitted between the host computer and the intelligent secret key device is encrypted by the session secret key, the information is difficult to be intercepted by malicious programs.
Owner:FEITIAN TECHNOLOGIES

Internet of Vehicles distributed trust system based on HashGraph and trust value calculation method

The invention provides an Internet of Vehicles distributed trust system based on HashGraph and a trust value calculation method, and the system comprises an OBU layer which is used for achieving the sensing, collection, calculation and communication functions of a vehicle node for information; a RSU layer which is a network layer formed by the drive test units, serves as a fixed communication node, provides service for wireless access of the vehicle nodes, and forwards the road condition information; a background trusted center (TC) which is used for distributing a secret key to the nodes in the access network and completing registration, revocation or authentication of node identities; and HashGraph block chain nodes, wherein the HashGraph block chain nodes are arranged on Internet of Vehicles nodes, and a plurality of HashGraph block chain nodes form the HashGraph block chain network. The invention discloses the Internet of Vehicles distributed trust system based on HashGraph and thetrust value calculation method. A block chain 3.0 technology-HashGraph is applied to research of the Internet of Vehicles trust mechanism, the problem of centralized single-point failure of a traditional Internet of Vehicles trust mechanism is solved, 103-104 transactions can be processed in parallel by the HashGraph, and the real-time requirement of the Internet of Vehicles is met.
Owner:NANTONG UNIVERSITY +1

Storage data integrity verification and recovery method

The invention provides a storage data integrity verification and recovery method. The storage data integrity verification and recovery method comprises the following steps of: firstly, partitioning information data, and generating data evidence; then, mapping the data evidence onto a server node, performing secondary pseudo-random placement of the data evidence, after verification applied by a user is passed, returning a stored data block and a corresponding evidence label to the user, and calculating and comparing the consistency of information through a private key and an evidence key, so that verification is realized; and, if data is attacked or tampered, when node failure in a system is detected, returning the position of an error node by the system, performing linear processing of a data block, which is smaller than a source file, according to secondary pseudo-random placement storage and a regeneration code, performing iterative operation of an effective node, and precisely recovering data. By means of the storage data integrity verification and recovery method provided by the invention, whether data is integrated, attacked and tampered or not can be checked by using a small amount of resources; due to secondary pseudo-random placement storage of the data, data can be recovered through undamaged data blocks; and furthermore, by means of the method, the storage overhead and the communication overhead are relatively low and high in anti-attacking property.
Owner:SICHUAN YONGLIAN INFORMATION TECH CO LTD

Space network cross-domain anonymous identity authentication method based on hyper-chaos encryption

The invention provides a space network cross-domain anonymous identity authentication method based on hyper-chaos encryption, relates to the technology of space information network, and solves the problem that the security mechanism applied in the conventional network cannot be directly applied to space network, and space cross-domain identity authentication cannot be realized. Provided is a space network cross-domain anonymous identity authentication method based on hyper-chaos encryption. The method includes two parts: a register stage and an authentication stage, a chaos algorithm is sensitive to initial conditions and control parameters, the structure is complex, prediction and analysis are difficult, and pseudo random sequences with good randomness and complexity are provided so that the chaos is applicable to encryption. A quantum cellular neural network is a cellular neural network structure coupling via quantum cellular neural network automata, complex linear dynamic features are obtained from the polarizability and quantum phase of each quantum cellular automaton, a nano-scale hyper-chaos oscillator can be constructed, the power consumption is low, the integration level is high, and the application requirement of space network satellite nodes can be better met.
Owner:CHANGCHUN UNIV OF SCI & TECH

Color image encryption method based on three-dimensional Logistic mapping and generalized Cat mapping

The invention provides a color image encryption method based on three-dimensional Logistic mapping and generalized Cat mapping, which comprises the following steps: reading an original color image toobtain two-dimensional pixel matrixes corresponding to R, G and B components, and straightening the two-dimensional pixel matrixes to obtain three pixel sequences; three groups of chaotic sequences are generated through three-dimensional Logistic mapping iteration, and subjecting the three groups of chaotic sequences and the three pixel sequences to XOR operation to realize diffusion processing; carrying out data reconstruction on the chaotic sequence obtained after diffusion processing and expanding the chaotic sequence into a three-dimensional cube; performing position scrambling processingon the three-dimensional cube through generalized Cat mapping; and converting the three-dimensional cube with the scrambled position into a cuboid which is a ciphertext image. According to the method,parameters and initial values of three-dimensional Logistic mapping and generalized Cat mapping and the plaintext image size are used as keys, the key space is increased. Encryption safety is improved, and the method has the advantages of being high in key sensitivity, high in anti-attack capability and the like.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Robust hidden watermark embedding and extracting method for 3D high definition digital videos

The invention provides a robust hidden watermark embedding and extracting method for 3D high definition digital videos, and belongs to the crossing field of image processing, etc. A user inputs a segment of 3D video, and an algorithm divides the 3D video into sequence frames according to a frame rate thereof and carries out an embedding operation on each frame in the sequence frames. On each frame, the algorithm separately carries out DCT conversion on left and right views with 8 * 8 pixel blocks a unit at first. Each bit in a watermark is sequentially embedded on a pair of 8 * 8 DCT coefficient blocks at the same positions in the left and right channel views. A watermark algorithm selects intermediate frequency areas in the DCT coefficient blocks for embedding and introduces three coefficient limit mechanisms to effectively limit the embedding strength, which are respectively a least identifiable difference perception model, a fine grain modulation parameter and an embedding reference matrix. According to the robust hidden watermark embedding and extracting method provided by the invention, the overall complexity is simplified on the theoretical foundation of the study of the watermarking technology based on single channel video, intensive tasks can be processed and calculated in parallel, the processing speed of the high definition 3D videos is accelerated, and the imperceptibility and the robustness are guaranteed on the premise of achieving the above effects.
Owner:BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products