Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

41 results about "N-Hash" patented technology

In cryptography, N-Hash is a cryptographic hash function based on the FEAL round function, and is now considered insecure. It was proposed in 1990 by Miyaguchi et al.; weaknesses were published the following year.

Video stream address authentication method and apparatus

The invention discloses a video stream address authentication method. The method comprises the following steps: if a live video viewing instruction of a target room on a live broadcast platform is received, obtaining M authentication elements, wherein the authentication elements are related to the current state of a client or the target room; determining a target hash function matched with a first authentication element in the M authentication elements from N hash functions through a multi-state hash function interface; calling the target hash function to calculate hash values of the M authentication elements; determining a target encryption function matched with a second authentication element in the M authentication elements from K encryption functions through a multi-state encryption function interface; calling the target encryption function to encrypt the hash values of the M authentication elements based on a random key released by a video stream server so as to obtain a video stream address authentication value; and sending a request carrying the address authentication value to the video stream server. By adoption of the video stream address authentication method disclosed by the invention, the technical problem of relatively low security of video stream address authentication is solved.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

special computing circuit for realizing Hash operation

The invention discloses a special computing circuit for realizing Hash operation. The special computing circuit comprises at least one Hash computing module, The device specifically comprises a variable, a constant input unit, a Hash input unit, a Hash output unit and a Hash calculation unit. Wherein the number of times of iterative operation of the Hash operation is N, and each calculation modulecompletes N times of iterative operation by using N Hash calculation units; Wherein the N hash calculation units are connected through a hardware connecting line, a group of new input data is initially input to the hash calculation unit through the hash input unit in the clock period A of each calculation, and the hash input value of the next hash calculation unit is the hash output value of theprevious hash calculation unit; The number of the N variable input units and the number of the constant input units are correspondingly connected with the N Hash calculation units respectively and used for inputting corresponding variable values and constant values. And a result is output by the Hash output unit after the primary Hash operation is finished. By utilizing the special computing circuit, the power consumption and the cost of the computing circuit can be reduced during Hash operation.
Owner:北京智云芯科技有限公司

Method for realizing data fusion and data privacy protection based on Hash algorithm and session control

The invention relates to a method for realizing data fusion and data privacy protection based on a Hash algorithm and the session control. The method comprises the following steps that a demand module sends a query request after Hash calculation to a mapping data providing module; the mapping data providing module inquires whether the data exists or not; a demand module queries the provider data from the portrait data providing module; a portrait data providing module inquires the previous n hash value lists; the mapping data providing module returns the hit information to the portrait data providing module; and the portrait data providing module queries the data. By the adoption of the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, the leakage of the high-sensitivity information caused by query of low-sensitivity information is avoided, and the data derogatory caused by the data diffusion is also avoided. According to the implementation scheme, the user privacy information of three parties cannot be leaked except the user portrait information, so that the data privacy and the data security of the individual users and the enterprise users are guaranteed.
Owner:上海富数科技有限公司

Method and device for sending digital television signal data based on alternative text combination

The invention discloses a method and a device for sending digital television signal data based on alternative text combination. The method comprises the steps: acquiring preset digital television signal data, and calling a preset key pair; performing encryption processing to obtain encrypted data, and sending the encrypted data; if signal receiving ends are all authorized terminals, acquiring n feature data sets; respectively carrying out Hash calculation to obtain n Hash values; performing discovery processing on coincident character fields to obtain n coincident character fields corresponding to the n hash values respectively; performing n-batch splitting processing on the private key to correspondingly obtain n private key section combinations; performing alternative text combination generation processing to generate n alternative text combinations corresponding to the n private key section combinations; and sending the ith splitting method, the ith alternative text combination and the ith interception method to the ith digital television signal receiving end, thereby improving the security of the secret key and the information security and realizing the fine control of the authority.
Owner:深圳佳力拓科技有限公司

A method for data fusion and data privacy protection based on hash algorithm and session control

The invention relates to a method for realizing data fusion and data privacy protection based on a Hash algorithm and the session control. The method comprises the following steps that a demand module sends a query request after Hash calculation to a mapping data providing module; the mapping data providing module inquires whether the data exists or not; a demand module queries the provider data from the portrait data providing module; a portrait data providing module inquires the previous n hash value lists; the mapping data providing module returns the hit information to the portrait data providing module; and the portrait data providing module queries the data. By the adoption of the method for realizing data fusion and data privacy protection based on the Hash algorithm and the session control, the leakage of the high-sensitivity information caused by query of low-sensitivity information is avoided, and the data derogatory caused by the data diffusion is also avoided. According to the implementation scheme, the user privacy information of three parties cannot be leaked except the user portrait information, so that the data privacy and the data security of the individual users and the enterprise users are guaranteed.
Owner:上海富数科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products