Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31results about How to "To achieve the purpose of encryption" patented technology

Chirp signal-based signal transmitting and receiving method for ultra wide band secret communication

The invention discloses a Chirp signal-based signal transmitting and receiving method for ultra wide band secret communication, which relates to a signal transmitting and receiving method for the ultra wide band secret communication and solves the problem that a conventional communication method cannot ensure the security of communication in the communication. The Chirp signal-based signal transmitting and receiving method for the ultra wide band secret communication comprises a transmitting process and a receiving process, wherein the transmitting process comprises the following steps: mapping digital information output by an information source to obtain binary modulation information, and sending and emitting a pulse signal of a current time according to a set parameter by a modulation Chirp signal generator; and the receiving process comprises the step that: in a system set time, a receiving end samples the ith modulation signal, performs fractional Fourier transform and parameter adjustment on the ith modulation signal, adds and synthesizes the signals to obtain a synthesized signal and demodulates and outputs the synthesized signal. The method is suitable for the process of the ultra wide band secret communication.
Owner:HARBIN INST OF TECH

Image encryption and decryption method based on novel two-dimensional fractional order chaotic mapping

The invention discloses an image encryption and decryption method based on novel two-dimensional fractional order chaotic mapping, and the method is characterized in that during encryption, S1, a fractional order chaotic signal is generated; s2, scrambling the original image by using the fractional order chaotic signal; s3, selecting a secret key image, and encrypting the scrambled image pixel value by using the fractional order chaotic signal and the secret key image; during decryption, I, the pixel value of the encrypted image is decrypted by using the chaotic signal sequence and the secret key image; and II, recovering the pixel position of the encrypted image by using the chaotic signal sequence. Fractional order two-dimensional TFCDM chaotic mapping is used for generating a chaotic sequence, then discrete chaotic signals are used for scrambling image pixels and diffusing pixel values for encryption, the discrete chaotic signals generated by a new mapping formula are more complex in structure and higher in randomness, the complexity of an encryption algorithm is higher, the fractional order is added as a secret key, and the encryption efficiency is improved. The algorithm has the advantages of larger key space, higher attack resistance and higher security.
Owner:NORTHWEST A & F UNIV

Method for extracting spacial position feature value of fixed length from information

The invention relates to a method used for extracting fixed-length spatial location characteristic numerals from information in the information security techniques, which comprises the following steps: parameter information of a fixed-length spatial location is obtained; decimal expression values of the information in a code table are obtained by a symbol set in a computer; a converting method from the information to the spatial location is obtained; the fixed-length spatial location characteristic numerals are analyzed; and the input information is processed by the computer or other equipments with computing and storing functions, thus obtaining the spatial location characteristic numerals which are corresponding to the input information. The method can simply, intuitively and efficiently extract the unique fixed-length spatial location characteristic numeral which are corresponding to the information from the information; by the method, the same effect can be achieved by judging the spatial location characteristic numerals when the user judges whether the information is modified in a transmission process; and as the spatial location characteristic numerals have fixed length and certain regularity, the efficiency is greatly improved, when the processing of the information including encryption, identification and judgement is carried out, and the method has strong practicability.
Owner:北京乾坤化物数字技术有限公司

Process and device for preventing fraudulent use of terminal software

The present invention discloses a method which can prevent the terminal software from being embezzled, the encryption flow is as follows: a plain code, a key1 and a key 2 are set, the key 1 is used to encrypt the plain code to get a password, the key 2 is used to encrypt the key 1 to get a key 3, at last, the password and the key3 are stored in a microprocessor, the key 2 is stored into a memory; the decryption flow is as follows: authentication software reads the password and the key 3 from the microprocessor, and the key2 is read from the memory, the decryption is performed to get the plain code, the plain code is used to judge whether the plain code is as same as the pre-set plain code, if the plain code is as same as the pre-set plain code, then the decryption is successful, otherwise, the decryption is failure. At the same time, a device which prevents the terminal software from being embezzled is disclosed, the device includes a microprocessor used to store the password and the key3; a memory used to store the key2, and a processor unit used to implement the authentication of terminal software. Through the present invention, the terminal scheme provider is enabled to possess a set of completely independent terminal software protection mechanisms.
Owner:LEADCORE TECH

Inter-core communication method and device in multi-core microprocessor

The invention relates to an inter-core communication method and device in a multi-core microprocessor, and the method comprises the steps: obtaining to-be-sent information which comes from a first core and is used for being sent to a second core; generating a target communication key according to a to-be-sent protocol header; encrypting the to-be-encrypted data through the target communication key to obtain encrypted data; transmitting the encrypted data and the protocol header to be sent to a second core; under the condition that the target information is determined to be information to be sent according to the target protocol header in the target information acquired by the second core, generating a target communication key according to the target protocol header, and sending the target communication key to the second core, so that the second core decrypts data to be decrypted in the target information through the target communication key to obtain decrypted data. According to the application, the purpose of encrypting the communication information between the dual cores can be achieved, and the problem that the confidential information of a user is leaked due to the fact that a hacker obtains the communication content between the cores through monitoring is prevented.
Owner:GREE ELECTRIC APPLIANCES INC +1

Multi-core optical fiber transmission method based on high-dimensional constellation multistage encryption

The invention relates to the technical field of optical transmission, and discloses a multi-core optical fiber transmission method based on high-dimensional constellation multi-level encryption, which comprises the following steps of: 1) performing off-line digital signal processing on original data to generate an encrypted signal, and importing the encrypted signal into an arbitrary waveform generator to perform digital-to-analog conversion at 25GSa/s; and 2) amplifying the radio frequency signal through an electric amplifier before the radio frequency signal is injected into the Mach-Zehnder modulator for intensity modulation. According to the multi-core optical fiber transmission method based on high-dimensional constellation multistage encryption, a spherical encryption high-security optical transmission method is designed, so that signals on a transmission channel have a property similar to random noise, the purpose of information encryption is achieved, the difficulty of stealing information by an illegal ONU is greatly improved, and the security of the ONU is improved. Therefore, the overall safety of optical network transmission is improved, and meanwhile, the seven-core optical fiber is adopted for transmission, so that the transmission capacity is greatly improved.
Owner:NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products