Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

43 results about "Information technology security" patented technology

Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, malicious and accidental threats. This defense includes detection, prevention and response to threats through the use of security policies, software tools and IT services.

Method for processing RSA password based on residue number system and coprocessor

The invention relates to information technology security and microprocessor design. Aiming at increasing RSA (Ron Rivest, Adi Shamirh and LenAdleman) modular multiplication operation speed and improving RSA encryption and decryption performances, the invention provides the technical scheme as follows: a method for processing an RSA password based on a residue number system comprises the followingsteps of performs encryption and decryption operations by using an RSA algorithm and performing large-number modular exponentiation of the RSA algorithm by using an L-R (Left-Right) binary scanning modular power algorithm; an improved Montgomery algorithm is specifically as follows: 1024-bit large numbers with are expressed as numbers under the residue number system, namely two sets of 33 32-bit decimal numbers and one 32-bit number expressed under a redundancy base; an expression process is a mould solving process; the decomposed 32-bit decimal numbers respectively participate in 32-bit modular multiplication, modular multiplication accumulation and modular addition operation independently; furthermore, 32-bit data performs parallel execution operation without dependence; and the method disclosed by the invention is mainly applicable for the information technology security and microprocessor design.
Owner:PHYTIUM TECH CO LTD

Cryptographic algorithm realization protecting method used for defending energy analysis attacks

The invention discloses a cryptographic algorithm realization protecting method used for defending energy analysis attacks, and belongs to the field of information technology safety. According to the method, intermediate values of a cryptographic algorithm are protected through adding proper encoding and decoding steps to an execution process of the cryptographic algorithm. The method comprises the steps that firstly, before the algorithm, all data participating in the operation, including plain texts, secret keys and possible initial vectors, are encoded; afterwards, in the running process of the algorithm, cryptographic computing is conducted by using the encoded data and corresponding operations according to the steps of the cryptographic algorithm, so as to complete the encryption-decryption process; and finally, after the algorithm is finished, encoded result data are decoded, and normal output of the algorithm is obtained. The method has the advantages that only the intermediate values of the cryptographic algorithm are encoded, so as to guarantee that information is not leaked by the intermediate values; the input and the output of the algorithm are not changed, so that a running result of the algorithm is guaranteed to be accurate; and meanwhile, safety performance higher than that of a mask defense measure can be obtained, and the performance cost is lower.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Software safety function component management method based on CC (the Common Criteria for Information Technology Security Evaluation)

The invention discloses a software safety function component management method based on CC (the Common Criteria for Information Technology Security Evaluation), which is used for implementing recommendation and adjustment of a safety function component based on the CC at the demand analysis stage of software engineering. The method comprises the following steps of: performing abstract analysis and induction on description of threatening information in estimation documents in various fields based on a CC system, thus establishing a threat knowledge base; recommending a corresponding safety function component set for each threat knowledge in the threat knowledge base, and establishing a corresponding relationship between each threat knowledge and safety function components based on standard semantics; and establishing a safety function component cost evaluation table according to each safety function component type, and adjusting the components according to the content of the table. Compared with the prior art, the software safety function component management method points out the safety function component recommending and adjusting method based on the CC at the software requirement analysis stage, so that the software safety problem is considered at the initial stage of the development of a software system, the possibility of a security hole is reduced, and the software safety is improved.
Owner:TIANJIN UNIV

Automatic management method for IT (information technology) data center server system

The invention discloses an automatic management method for an IT (information technology) data center server system. The automatic management method comprises the following steps of collecting the state and the information of hardware of a server by using a chipset of the server; customizing operation system information collecting scripts and collecting operation system software and information of a relevant software running state machine by using a central processing unit according to collected states and information of the server; storing the information in a database; analyzing running states and running information of a server system by using the central processing unit according to the collected information; and timely issuing the analyzed common running state and analyzed common running information of the server system. By the automatic management method, manual daily work in the original IT informatization operation and maintenance is replaced, effective data analysis and support on IT operation, maintenance and management is realized, the scientificity and the efficiency of the IT operation, maintenance and management are improved, the human resources on operation and maintenance are saved, an auxiliary decision is provided, and the operation cost is reduced.
Owner:STATE GRID CORP OF CHINA +2

Softdog device and secondary authorization management method based on softdog

The invention relates to the field of information technology security, and in particular relates to a softdog device and a secondary authorization management method based on a softdog. A hardware and software combined softdog having a secondary authorization function comprises a USB interface, a USB-serial interface converter, a single-chip microcomputer and a power supply; and furthermore, the softdog has the secondary authorization management permission. The method comprises the following steps of awarding a mother softdog having the secondary authorization permission to an industry algorithm library; completing compiling and encapsulation of the industry algorithm library by using the mother softdog; activating the secondary authorization function by using the mother softdog, and authorizing a child softdog; copying the industry algorithm library into a child softdog workstation; and calling and using the copied industry algorithm library by using the child softdog. By means of the softdog device and the secondary authorization management method based on the softdog disclosed by the invention, the risk that the industry algorithm library having the proprietary intellectual property is leaked can be put an end; and information security is also ensured while the programming workload is greatly reduced.
Owner:杭州优稳自动化系统有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products