Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32 results about "Commutative encryption" patented technology

Secure communication method based on intelligent door lock system and intelligent door lock system

The invention discloses a secure communication method based on an intelligent door lock system and belongs to the technical field of intelligent home and security. The intelligent door lock system comprises an intelligent door lock and a mobile terminal which are in remote communication connection with a cloud server respectively. The method comprises the steps that the intelligent door lock and the mobile terminal are connected through a preset secure communication channel, and encryption keys are exchanged; to-be-transmitted data is generated through a sending end and encrypted through the encryption keys by using a preset encryption algorithm, and encrypted data is obtained; the sending end sends the encrypted data with the unique identification to a receiving end through the cloud server; identity authentication is conducted through the receiving end on the encrypted data with the unique identification, and the encrypted data is processed according to an identity authentication result. According to the method, no encryption key is saved in the server so that the server cannot understand the data forwarded through the server, even if the server is compromised, data encryption, identity authentication and replacement and tamper resisting in the communication between the intelligent door lock and the mobile terminal are still effective, and data security is ensured.
Owner:YUNDING NETWORK TECH BEIJING

Scheme for device and user authentication with key distribution in a wireless network

InactiveUS20080115199A1Relieve burdenLight computational burdenRandom number generatorsUser identity/authority verificationUser authenticationClient-side
In a computer network, a method of mutually authenticating a client device and a network interface, authenticating a user to the network and exchanging encryption keys. In one embodiment, the method comprises authenticating the client device at the local network device point, with which the client device exchanges an encryption key and then the user is authenticated by a central authentication server. In another embodiment, the method comprises authenticating the client device at the central authentication server, with which the client device exchanges a key which is passed to the network device with a secret shared between the central authentication server and the network device. In this embodiment, the user is also authenticated at the central authentication server.
Owner:HEWLETT PACKARD CO

Method for encrypting data memory apparatus based on virtual system

The invention discloses a method for encrypting data memory apparatus based on virtual system, which belongs to the field of software technique. The method provided by the invention includes the steps of: (1) establishing a virtual machine platform and several virtual systems; (2) setting a commutative encryption and decryption algorithm module inside the virtual machine platform for providing an encryption algorithm for the virtual system; (3) dividing a data memory apparatus by the virtual machine platform, allotting a data memory space for each virtual system, meanwhile setting a cipher key and an encryption algorithm for each virtual system; (4) sending the used cipher key to the virtual machine platform when the virtual system accesses the data memory apparatus; (5) executing a consistency verification for the cipher key of the virtual system by the virtual machine platform, if consistent, and then using the cipher key and the corresponding encryption algorithm for executing a corresponding data-processing. The encryption algorithm provided by the invention is irrelevant to hard disk and VMM, and the encryption algorithm upgrade is convenient; moreover different storage zone can use different encryption keys for improving data safety.
Owner:宏电脑上海

Data collision method and device, storage medium and electronic equipment

The invention relates to the technical field of computers, in particular to a data collision method and device, a storage medium and electronic equipment. The method comprises the following steps: encrypting first original data by using a first key according to a preset exchangeable encryption algorithm to obtain first encrypted data; acquiring second encrypted data, wherein the second encrypted data is obtained by encrypting the second original data by using a second key according to an exchangeable encryption algorithm; encrypting the second encrypted data by using the first key according toan exchangeable encryption algorithm to obtain third encrypted data; acquiring fourth encrypted data, wherein the fourth encrypted data is obtained by encrypting the first encrypted data by using thesecond key according to an exchangeable encryption algorithm; and obtaining an encrypted data intersection of the third encrypted data and the fourth encrypted data, and determining an original dataintersection of the first original data and the second original data based on the encrypted data intersection. According to the method, data collision can be completed under the condition of protecting private data from being leaked.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Encryption-based Wireless Unlocking Method

The invention discloses an encryption-based wireless unlocking method. The encryption-based wireless unlocking method comprises the following steps of entering an unlocking process; reporting the effective unlocking time range, the authority range and the unlocking reason of a designated lock to an unlocking management platform to apply for an unlocking authority; through the unlocking managementplatform, handing the unlocking authority application to an administrator for examination and approval, who corrects an appropriate time range and an appropriate authority range to complete examination and approval; then generating authorization data via the unlocking management platform; via the unlocking management platform, delivering the authorization data to a wireless terminal, which exchanges encrypted data with the lock; encrypting the authorization data in the wireless data and transmitting the encrypted authorization data to the lock; verifying the encrypted authorization data in thelock to determine whether the encrypted authorization data are legal, if so, unlocking the lock; else, quitting the unlocking process. The encryption-based wireless unlocking method has the advantages of achieving authorization controllability and ensuring key safety, authorization safety and lock safety.
Owner:广州创想云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products