Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

354 results about "Multiple encryption" patented technology

Multiple encryption is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm. It is also known as cascade encryption, cascade ciphering, multiple encryption, and superencipherment. Superencryption refers to the outer-level encryption of a multiple encryption.

Network identity verification method based on internet third party biological characteristic validation

The invention provides a network identity authentication method based on the biological characteristic authentication of a third party on the Internet. The biological characteristics (fingerprint, human face, iris, lip membrane and so on) are used as the identity identification of the user, the user can obtain an authentication request from the third party by submitting the biological characteristic codes through a client terminal widget provided by the third party, the identity authentication is carried out through the request password process and the matching algorithm, the Internet identity authentication can be carried out through a fully cooperative website or an application program provided by a cooperative network in a self-help mode, the third party provides request interfaces containing the registration, verification, reset of the biological characteristics, binding information,etc., the third party needs not to know the name of the user in the cooperative website or the application program provided by the cooperative network, thus avoiding to obtain the other information of the user in the cooperative website or the application program provided by the cooperative network, the reliability at the service terminal and the communication safety among the three parties can be guaranteed through the complete active service request of the cooperative website or the application program provided by the cooperative network, the Cookie, SSL, multi-encryption, digital signature of the widget, user-defined words or pictures,etc.
Owner:张曌 +2

Method for a Dynamic Perpetual Encryption Cryptosystem

A dynamic computer communication security encryption method or system using an initial seed key and multiple random number generators of a specific design, whereby a sequence of independent random entropy values is produced by one set of random number generators and encrypted along with the message stream using the initial seed key, or the output of a second set of random number generators initialized with the initial seed key, and following the subsequent transmission of the variable encrypted entropy/message block, the entropy values are used to symmetrically or identically augment or increase the current uncertainty or entropy of the cryptosystem at both the sender and the receiver, prior to the next encryption block operation. The encryption process effectively entailing the use of multiple encryption ciphers, and the entropy augmentation process entailing the encryption or application of various logical mathematical operations on the already dynamic but deterministic internal state values of the second set of random number generators, effectively altering their deterministic outputs in a random probabilistic manner.
Random length message value sequences from one or more data sources is combined with one or more random length entropy value sequences from an independent source, following which the entropy “updates” may also be used to alter, or change any cryptosystem variable, value or component in a randomly determined manner. In addition, whilst ensuring synchronization, the random entropy sequences also serve to “pollute” the cipher-stream and thereby hinder most current forms of cryptanalysis, whilst simultaneously injecting additional entropy into the cryptographic system and allowing for its propagation to affect any connected system nodes, and thereby introducing unpredictable entropy into the system pseudorandom number generator outputs, and thereby ensuring the perpetual generation of unpredictable random numbers.
Super-encryption mechanics are independent of the user data, simple, fast and efficient, and can incorporate compression, error correction and asymmetric encryption authentication routines. But most importantly, super-encryption ensures resistance to brute force attacks (not possible to verify if a message was even sent), an ability to exceed “perfect secrecy” requirements, and an improvement on previous super-encipherment design, since overhead can be dramatically reduced from 100% overhead.
Communication links previously established by system nodes with central authorities may be used for secure node authentication and registration, whilst allowing the central authority to broker and synchronize communication channels and providing mutual authentication and other security functions between the system nodes.
Owner:FIGUEIRA HELDER SILVESTRE PAIVA

Mobile phone door lock system based on asymmetric secret key and realization method thereof

The invention discloses a mobile phone door lock system based on an asymmetric secret key and a realization method thereof, and belongs to a mobile phone door lock. The system comprises an intelligent mobile phone, a door lock and a server; data transmission among the intelligent mobile phone, the door lock and the server is carried by network; the server is used for storing a mobile phone identification number blacklist, and encrypting door opening permission serial data after the verification is valid and sending the serial data to the mobile phone; the intelligent mobile phone is used for sending the door opening permission serial data of the mobile phone to the door lock, and the door opening authority serial data at least comprises a door lock ID, a mobile phone identification number, etc.; the encrypted permission serial data and black list verification and multiple encryption and decryption verifications are carried out between the mobile phone, the door lock and the server, thereby solving the technology problem that the prior mobile phone door lock product cannot withstand replay attack and the invalid unlocking risk is high, providing a complete permission distribution, authentication and cancel process, greatly improving safety performance of the mobile phone door lock product, and promoting the development of the mobile phone door lock industry.
Owner:蔡炜

Two-dimensional code multi-enciphering anti-fake printing method

ActiveCN101295343ASolve the problem of getting the information in the QR codeImprove confidentialityDigitally marking record carriersSensing record carriersMultiple encryptionConfidentiality
The invention relates to the anti-counterfeiting printing technical field, in particular to a multi-encryption and anti-counterfeiting printing method for a two-dimensional code which is applicable to the two-dimensional code and has encryption requirements on the information of the two-dimensional code, and the multi-encryption and anti-counterfeiting printing method is carried out according to the following steps: (1) original data of the two-dimensional code to be encrypted is input to an encryption system; (2) the encryption system takes out one or a plurality of bits from the original data of the two-dimensional code to carry out a first encryption algorithm calculation, thus obtaining a group of random check codes; (3) the group of random check codes are arranged in the original data of the two-dimensional code, thus generating a group of data containing the random check codes; (4) the obtained data containing the random check codes is carried out a second encryption algorithm calculation, thus generating the dual-encryption data; (5) the obtained dual-encryption data is utilized for generating the dual-encryption two-dimensional code; (6) the dual-encryption two-dimensional code is transmitted to a digital printing system for printing. The method can effectively prevent others from utilizing the existing two-dimensional code reading device to decode the encrypted content, thus obtaining the information in the two-dimensional code and having good confidentiality.
Owner:HONGBO CO LTD

Steganography-based key transmission and key updating method

The invention provides a steganography-based key transmission and key updating method, which is applied to the field of information safety. The method comprises the steps that a communication party A sets a communication type, an encryption algorithm an steganography algorithm, selects a steganography carrier and generates a communication identifier and then performs the updating of a transmission key or the transmission process of a conversion key; a new transmission key is selected when in updating, a time stamp and a signature are generated to encrypt and steganograph the transmission key, the key updating information is generated to be transmitted to a communication party B, and the communication party B performs the verification, de-staganography and deciphering to obtain the transmission key; and the conversion key is selected in transmission to generate a time stamp and a signature so as to encrypt and steganograph the conversion key, the key transmission information is generated to be transmitted to the communication party B, and the communication party B performs the verification, de-steganography and deciphering to obtain the conversation key. The key is concealed by utilizing the steganography, so that an encrypted data format in the key transmission process and the key updating process can be effectively protected, and the safety transmission of multiple encryption and decryption algorithm conversation keys can be realized.
Owner:BEIHANG UNIV

Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same

The invention provides a uniform resource locator (URL) encryption and validation method for mobile internet user resource access and a device provided with the URL encryption and validation method for the mobile internet user resource access. A user side responses to a resource access request from a user, a request parameter set is obtained, an original parameter sequence of the resource access request is generated, a first secret key sequence is obtained after mini disk (MD) encryption, transposition and inserting of a random sequence, and added to the request parameter set, and further, an encryption URL is generated. A terminal receiving encryption URL is provided in the content of the invention embodiment, and the original parameter sequence and the first secret key sequence are extracted from the terminal receiving encryption URL. An encryption processing similar to an encryption processing of the user side is performed on the original parameter sequence, and then the original parameter sequence is compared with the first secret key sequence, if the original parameter sequence is consistent with the first secret key sequence, the user is allowed to access resource, and otherwise, the user is not allowed to access the resource. A multiple encryption technology is adopted for generating of request parameters, encrypted parameters have timeliness and uncrackable performance, and therefore when the user requests for the access of a resource class URL, the security of resource URL access request can be guaranteed, and request information is prevented from being hotlinked or falsified.
Owner:MDC TELECOM CO LTD

Identity real-name authentication method and authentication system based on express sending

The invention discloses an identity real-name authentication method and authentication system based on express sending. The method comprises: when an intelligent terminal of a courier receives a sending request of a user, acquiring identity information of the user and sending data; by the intelligent terminal of the courier, uploading the identity information of the user and the sending data to a corresponding express company system after encrypting the identity information of the user and the sending data; by the express company system, carrying out decryption after carrying out integrity checking on the received encrypted identity information of the user and the received encrypted sending data, generating an identity information abstract on the decrypted identity information of the user, and storing the analyzed sending data; and by the express company system, carrying out real-name authentication on the identity information abstract of the user, storing the identity information abstract after successfully carrying out real-name authentication, and returning an authentication result to the intelligent terminal of the courier. According to the identity real-name authentication method and authentication system based on express sending, which are disclosed by the invention, a multiple encryption method is adopted, so that safety of user identity information transmission is improved; and the courier is prompted whether to send an express item to the user according to an identity checking result, so that data leakage is prevented, and convenience is provided for the user.
Owner:深圳支付界科技有限公司

Implementation method and apparatus for multimedia broadcast multiple ciphering and deciphering

The invention provides a multimedia broadcasting multiple encryption and decryption method and an apparatus for improving the safety of a mobile multimedia broadcasting system. The encryption method comprises: performing a first order scrambling to a coded program stream and/or data pack, performing a first order encryption and second a order encryption to a used cipher key when scrambling, wherein the first scrambling employs the program stream and/or data pack as objects, the first encryption is to encrypt the cipher key during the first scrambling and to obtain a first entitlement control message (ECM1) and a first entitlement management message (EMM1), the second order encryption comprises twice encryption, the first encryption employs a second cipher key to encrypt the obtained ECM1 and the EMM1 after the last order encryption, the second encryption is to encrypt the second cipher key; encapsulating the encryption of the scrambled program stream and/or data pack and the obtained results after the second encryption to service integration frames, allocating a control information table and encapsulating the table to a control integration frame; modulating the encapsulated integration frame to an electromagnetic wave on a physical channel and transmitting the electromagnetic wave to the air.
Owner:ZTE CORP

Order-preserving method and system for encrypting and decrypting messages by multiple encryption and decryption chips in parallel

The invention discloses an order-preserving method for encrypting and decrypting messages by multiple encryption and decryption chips in parallel. The order-preserving method comprises the following steps of: S1, setting a message processing cyclic chain table, after any central processing unit (CPU) receives a message, acquiring an encryption and decryption key corresponding to the message, and putting the messages and the corresponding encryption and decryption keys to corresponding nodes of the message processing cyclic chain table; S2, acquiring idling encryption and decryption chips by the CPU, and sending the corresponding messages to the encryption and decryption chips; and S3, reading node data of the nodes corresponding to the messages, encrypting and decrypting the messages according to encryption and decryption types of the messages, and putting the messages back to the corresponding nodes of the message processing cyclic chain table. The invention also discloses an order-preserving system implementing the order-preserving method. By the method and the system, the order of the messages can be guaranteed when multiple encryption and decryption chips encrypt and decrypt the messages at the same time, and a disorder phenomenon during sending of the messages is avoided.
Owner:OPZOON TECH

Method and system for license control of Linux operating system

The invention relates to a method for the license control of a Linux operating system. The method comprises two parts, namely a self protection mechanism and a license management mechanism respectively, wherein the self protection mechanism is implemented by both a kernel layer license control self-inspection module and an application layer license communication module; and the license management mechanism is implemented through a license communication module by an application layer license control module and an application layer license distribution module. The self protection mechanism loads the license control self-inspection module into a kernel space by utilizing the loading of a Linux system kernel, and the license control self-inspection module finishes integrity inspection on the license control function of the system and performs corresponding processing according to an inspection result. By the method, the problem that the license control function of the conventional software or system is cancelled can be effectively solved, and the validity of a license file in a distribution process can be ensured by multiple encryption, so the license file is prevented from being randomly falsified. The method has universality, and can be used for realizing user license control in a Linux environment.
Owner:CHINA STANDARD SOFTWARE

Medical data encryption transmission system and method

The invention provides a medical data encryption transmission system and method. The method comprises the following steps: cutting the medical data to be transmitted into multiple data blocks and numbering each data block; sequentially generating an encryption request corresponding to each data block according to the number of the data blocks; sending the encryption request corresponding to each data block to a medical cloud platform to ensure that the medical cloud platform matches an encryption-decryption algorithm for each data block; receiving the harsh value of the encryption-decryption algorithm matched with each data block from the medical cloud platform; finding the corresponding encryption-decryption algorithm from a medical data acquisition terminal according to the harsh value corresponding to each data block, and encrypting each data block; and transmitting and storing each encrypted data block into the medical cloud platform. According to the implementation of the medical data encryption transmission system and method provided by the invention, the transmitted medical data is encrypted and decrypted by using a dynamic encryption-decryption algorithm, the same batch of medical data is encrypted by multiple encryption and decryption algorithms, and thus the information security of the medical data can be further improved, and secret leakage events can be avoided.
Owner:ANYCHECK INFORMATION TECH

Cloud intelligent lock system based on multiple encryption mode and secret key management method

The invention relates to a cloud intelligent lock system based on a multiple encryption mode and a secret key management method. The cloud intelligent lock system comprises an intelligent lock, a cloud management platform and a client, the intelligent lock is registered to the cloud management platform by adopting networking authentication registration through a NB-IOT (Narrow Band-Internet of Things) network, the client binds the authority information of fingerprints, an entrance guard card and bluetooth of a user in a matched mode according to the identity information of the user, the authority information is enabled to generate ciphertext to be sent to the corresponding intelligent lock through communication secret keys of the intelligent lock and an encryption algorithm, and the cloudmanagement platform adopts a secret key dispersing algorithm to disperse corresponding Managekeys so as to form modes of one lock to one secret key, one card to one secret key and one bluetooth to onesecret key. According to the cloud intelligent lock system based on a multiple encryption mode and the secret key management method, the intelligent lock is registered to the cloud management platform by adopting a networking authentication mode, so that networking of intelligent lock equipment is realized, centralized management is facilitated, particularly for hotels and public renting housings, personnel and safety management is facilitated, different encryption secret keys for different door opening modes and different encryption secret keys for the same door opening mode are adopted, andtherefore the safety is fully guaranteed.
Owner:HANGZHOU GOGENIUS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products