Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

121 results about "Cryptography protocols" patented technology

A cryptographic protocol is a protocol executed by several distant agents through a network where the messages or part of the messages are produced using cryptographic functions (encryption, hashing, etc.).

Authentication and access control method for CAN (Controller Area Network) bus

The invention relates to an authentication and access control method for a CAN (Controller Area Network) bus, which is characterized by particularly comprising the following steps of: (1) completing functional partitioning of a vehicle system, and defining each function as a logic functional region; (2) based on functional partitioning of the vehicle system in the step (1), partitioning nodes of the vehicle system into each logic functional region according to functions to which the nodes belong; (3) based on partitioning of each node logic functional region in the step (2), allocating a secret key to each logic functional region; (4) based on each secret key in the step (3), generating a session secret key of the corresponding logic functional region after a vehicle is started up every time; (5) based on each session secret key in the step (4), completing authentication and encryption of CAN data, and based on each secret key in the step (3), implementing secret key resetting on updated nodes. According to the authentication and access control method disclosed by the invention, based on a cryptography technology, a node authentication and encryption protocol of the CAN bus is constructed by utilizing a cryptographic algorithm, and resource access control on the integral CAN bus is implemented.
Owner:CHINA FIRST AUTOMOBILE

Realization method for reasonable construction and correct parse of communication data package based on alarm system

InactiveCN103095835ASolve the problem that it is difficult to distinguish correctly, and some even cannot be parsed correctlyAccurate analysisError preventionNetwork packetStream data
The invention relates to the technical field of security of computer networks, in particular to a realization method for reasonable construction and correct parse of a communication data package based on an alarm system. Fixed-length data package header identification is used as data package feature identification, the length of a fixed-length data package is set at the rear of the data package header identification, the system can parse the finial size of the package according to the length of the data package after receiving data and then parse out the whole data package, and the size of the whole package can be known without traversing to the end of the package. A coding scheme of abstract syntax markup is used for coding to divide the data into the operation type of Cmd and the operation content of Value, wherein Key corresponds to the header of data package, Length corresponds to the data length, Cmd and Value both correspond to the data, Key, Length, Cmd and Value are coded through the coding and the decoding rule to form a bit stream data package, and the data content is encrypted and decrypted through a special encryption protocol. The security and the transmission speed are obviously promoted.
Owner:成都理想科技开发有限公司

Network protocol identification method and system based on semi-supervised learning

The invention discloses a network protocol identification method and system based on semi-supervised learning, relating to the technical field of network safety. The method comprises the following steps of: training a plurality of classifiers based on a semi-supervised learning method; carrying out split-flow treatment on a network flow rate to be identified, and counting a single flow to be identified, which is obtained by the split-flow treatment, so as to obtain length information of a pre-set quantity of network packets in each single flow to be identified; and utilizing the classifiers to carry out protocol identification on the single flow to be identified according to the length information of the pre-set quantity of the network packets in the single flow to be identified. According to the network protocol identification method and system based on the semi-supervised learning, disclosed by the invention, a semi-supervised machine learning method is introduced into the protocol identification, namely that less calibrated sample information is used and a lot of unlabelled information is sufficiently utilized, so that the classification performance and the practical expansibility are met simultaneously; and the network protocol identification method and system have higher identification accuracy and higher identification speed, and can identify an encrypted protocol without depending on a lot of calibration data sets.
Owner:TSINGHUA UNIV

Verification of correct exponentiation or other operations in cryptographic applications

The correctness of an exponentiation operation or other type of operation associated with a multi-party cryptographic protocol is verified using first and second proofs based on a randomized instance of the operation. A prover generates signals corresponding to information representative of the first and second proofs based on the randomized instance. The first proof is a so-called “blinded” proof that the operation has been correctly performed, configured so as to prevent leaks of information relating to the cryptographic protocol. The second proof is a proof that the first proof has been correctly performed by the prover. The proof information signals are transmitted from the prover to a verifier, and the verifier uses the signals to determine if the operation associated with the cryptographic protocol is valid. For example, the verifier in an illustrative embodiment generates an indication that the operation was correctly performed if the first and second proofs are acceptable to the verifier, generates an indication that the operation was not correctly performed if the first proof is not acceptable but the second proof is acceptable, and generates an indication of a cheating prover if the second proof is not acceptable. The verification protocol can be used in applications in which the prover is distributed across a number of different machines.
Owner:WSOU INVESTMENTS LLC +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products