Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

125 results about "On-the-fly encryption" patented technology

On-the-fly encryption, also known as real-time encryption and transparent encryption, is a method used by some disk encryption software. "On-the-fly" refers to the fact that data is automatically encrypted or decrypted as it loaded or saved. With on-the-fly encryption, the files are accessible immediately after the key is provided, and the entire volume is typically mounted as if it were a physical drive, making the files just as accessible as any unencrypted ones.No data stored on an encrypted volume can be read without using the correct password/keyfile or correct encryption keys. The entire file system within the volume is encrypted. To be transparent to the end user, on-the-fly encryption usually requires the use of device drivers to enable the encryption process. Although administrator access rights are normally required to install such drivers, encrypted volumes can typically be used by normal users without these rights . In general, every method in which data is transparently encrypted on write and decrypted on read can be called on-the-fly encryption.

Method and system for implementing dynamic encryption communication between intelligent device and remote terminal

The present invention relates to the technical field of implementing a communication between an intelligent device and a remote terminal using a dynamic key, in particular to a method for implementing a dynamic encryption communication between an intelligent device and a remote terminal. The method includes: a cloud sever respectively establishes communication channels with an intelligent device and a remote terminal, so that the cloud sever, the intelligent device and the remote terminal communicate with each other by the channels; the intelligent device appoints a first-level encryption rule with the cloud sever and the remote terminal; after the remote terminal passes verification according to the first-level encryption rule, the intelligent device appoints a dynamic encryption rule with the cloud sever and the remote terminal; and the intelligent device performs an encryption communication with the remote terminal according to the dynamic encryption rule. A manner of using dynamic keys is disclosed in this method, to facilitate generating a transmission key dynamically according to this protocol when a communication is performed, thereby guaranteeing that keys used during the communication transmission between the intelligent device and different remote terminals are different keys, and avoiding hidden dangers existing in the traditional data transmission process.
Owner:北京同余科技有限公司

Data transmission method and device, computer device and storage medium

The invention discloses a data transmission method and device, a computer device and a storage medium, and the method comprises the steps: enabling a server to obtain a preset encryption field table when a to-be-transmitted task is detected to exist; the server determining a dynamic encryption field and an encryption algorithm corresponding to the current moment according to the encryption field table; the server encrypting data corresponding to the to-be-transmitted task based on the dynamic encryption field and an encryption algorithm to generate to-be-transmitted ciphertext data; and the server sending the ciphertext data to be transmitted to the client corresponding to the task to be transmitted; the client receiving ciphertext data to be transmitted; the client determining historicaltime information corresponding to the ciphertext data to be transmitted; the client acquiring a corresponding dynamic encryption field and a decryption algorithm based on the historical time information and a preset encryption field table; and the client decrypting the to-be-transmitted key data based on the dynamic encryption field and a decryption algorithm to generate plaintext data. Therefore,by adopting the embodiment of the invention, the risk of data leakage can be reduced.
Owner:PINGAN INT SMART CITY TECH CO LTD

Data dynamic encryption communication method and system based on two-wire system communication

ActiveCN110944009ARealization of dynamic encryptionPrevent brute force attacksTransmissionOriginal dataCarrier signal
The invention discloses a data dynamic encryption communication method based on two-wire system communication. The method comprises main node equipment data encryption sending and slave node equipmentdata receiving and responding, and the main node equipment data encryption sending process comprises the steps that to-be-sent data is encrypted in a fixed encryption mode, then a random dynamic secret key is sent, secondary encryption is conducted on the data through the random dynamic secret key, reverse order sending is conducted, and reply is waited after sending is completed; data receivingand responding processes of the slave node equipment are as follows: when a dynamic random key signal exists on a bus, detecting and storing the dynamic random key signal, then receiving encrypted data, decrypting the encrypted data by utilizing a dynamic random key, then performing reverse processing, finally decrypting by adopting a fixed encryption mode to obtain original data, generating encrypted reply data, and sending the encrypted reply data to the bus. According to the invention, dynamic encryption of two-bus or direct-current carrier data is realized, communication data is effectively prevented from being intercepted by external communication and violently attacked by the outside, and the security of data transmission is ensured.
Owner:WUHAN WUTOS

Encryption and decryption methods and devices of sliding track background picture

The invention provides encryption and decryption methods and devices of a sliding track background picture. The encryption method of the sliding track background picture includes: receiving a verification-code acquisition request sent by a client, and generating the original sliding track background picture according to the verification-code acquisition request; randomly dividing the original sliding track background picture into a plurality of division blocks, and using a randomly generated encryption factor to carry out out-of-order arrangement on the plurality of division blocks of the sliding track background picture; and encoding the encryption factor and a sliding track background image after out-of-order arrangement according to a set encoding mode to generate corresponding encrypted character strings, and returning the same to the client. According to the encryption and decryption methods and devices of the sliding track background picture provided by the embodiment of the invention, track background picture contents can be directly returned, a link form is not used, and server realization complexity is reduced; and the encryption method adopts out-of-order encryption and dynamic encryption, and greatly increases cracking costs and difficulty of a cracker.
Owner:MICRO DREAM TECHTRONIC NETWORK TECH CHINACO

Dynamic encryption safe login method and device

The invention provides a dynamic encryption safe login method and device. The method comprises the steps of: sending a random ID request to a user side accessing an application, and then receiving a verification code dynamically generated by the back end of the application; verifying the verification code, and if the verification is passed, generating a key according to the ID request; and obtaining encrypted user data by using the key and sending the encrypted user data to the back end of the application, so that the back end of the application verifies and logs in the encrypted user data. According to the invention, the segmented dynamic encryption transmission data starts from a security perspective; the possibility that the whole data is cracked after being stolen is avoided, the situation that the data is easy to crack due to the fact that encryption strings transmitted each time are the same under the condition that the same user logs in for many times is avoided, and the situation that the input of the user is intercepted and monitored after a malicious program is implanted is avoided. Therefore, the safety of data transmission of the user and the application is further improved, and the sensitive information of the user and the application can be safely transmitted and timely processed.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products