Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

890 results about "Safety Communications" patented technology

Safety communication secret key negotiation interaction scheme

The invention provides a method for safety communication between an application on a mobile terminal and a network server. Shared secrets of a user and a server are overlapped and bound with an identification code of mobile intelligent terminal equipment and a mobile phone number of the user by utilizing a cryptology; then the obtained product is applied to an identity authentication system to implement authentication on a client side; a digital certificate and a digital signature mechanism are utilized to implement authentication on the server; a session key is established with a network server by utilizing a Differ-Hellman secret key negotiation protocol so as to carry out safety data communication. The method is characterized in that the shared secrets are overlapped and bound with identification code of the machine and the mobile phone number of the user and the shared secrets are updated regularly; even though information is stolen by an attacker, a system still cannot be influenced. The user not only needs to provide a login password, but also needs to use the system on designated equipment. The method can ensure that the user carries out safety communication with the server on internet by the mobile equipment.
Owner:QINGDAO WEIZHIHUI INFORMATION

Internet of Vehicles safety communication method, vehicle-mounted terminal, server and system

The application provides an Internet of Vehicles safety communication method, a vehicle-mounted terminal, a server and a system. The Internet of Vehicles safety communication method is characterized by comprising the following steps: the vehicle-mounted terminal sends a handshake authentication request to a server after determining that the transmission control protocol connection with the server has been finished, wherein the handshake authentication request comprises an identifier of the vehicle-mounted terminal and a first Hash value encrypted by use of a symmetrical encryption algorithm same as that adopted by the server; the vehicle-mounted terminal receives an authentication response message returned by the server, wherein the authentication response message is returned by the server after determining that the vehicle-mounted terminal is legal; and the vehicle-mounted terminal establishes a safety authentication transmission protocol connection with the server according to the authentication response message. A lightweight safety authentication transmission protocol is established between the vehicle-mounted terminal and the server by use of less resource, and the security of the data transmission between the vehicle-mounted terminal and the server is improved.
Owner:NEUSOFT CORP

IP address jump safety communication method based on SDN framework

The invention discloses an IP address jump safety communication method based on an SDN framework. The method comprises steps that A, an IP address of a Host2 is requested by a Host1; B, a real IP address r2 of the Host2 is replaced by a virtual IP address h2 through a controller; C, a domain analysis response is forwarded by the controller to the Host1; D, an r1 is taken as a source address and the h2 is taken as a target address by the Host1 to send a data packet to the Host2; E, a flow rule is generated by the controller to replace the r1 by a virtual IP address h1, and the flow rule is issued; F, the r1 is replaced by the h1 through the source switch, and forwarding is carried out; G, the h2 is replaced by the r2 through the target switch, and forwarding is carried out; H, the r2 is taken as a source address and the h1 is taken as a target address by the Host2 to send a response data packet; I, the r2 is replaced by the h2 through the target switch, and forwarding is carried out; J, the h1 is replaced by the r1 through the source switch, and forwarding to the Host1 is carried out. Through the method, jump IPs can be dynamically distributed to a host computer in the IPH network, one-time one-change access to the host computer IP is transparently realized, attack based on scanning and DDoS attach can be effectively fought against.
Owner:芦斌

Internet of Things smart home security gateway system

ActiveCN104580233AEnhanced defense against attacksRealize free decouplingUser identity/authority verificationNetwork connectionsThe InternetSecure authentication
The invention relates to an Internet of Things smart home security gateway system. The system comprises a user side, a security gateway and a terminal node. The user side and the terminal node each comprise a data encrypting/decrypting module used for encrypting/decrypting a sent control order and received data through a preset encrypting program on a remote client side or the terminal node; the security gateway comprises a safety communication module, a user access control and node identity authentication module, a credible platform module and a log audit and alarm module; the safety communication module achieves data safety filtering, reconstructing and forwarding and guarantees safety of the bi-direction transmission; the credible platform module is used for achieving system safety authentication, user behavior credibility analysis, data sealing storage and free decoupling and can be independently maintained and upgraded; the log audit and alarm module is used for recording user access and node authentication behaviors, carrying out safety audit on the operation of viewing logs and giving a timely alarm for an abnormal phenomenon found in the gateway system safety monitoring process. By means of the Internet of Things smart home security gateway system, the safety performance of a smart home system and the running efficiency of a gateway can be improved, and a safety guarantee is provided for Internet of Things smart home.
Owner:重庆中邮信科集团股份有限公司

Method for safety communication of ECUs (Electronic Control Unit) in CAN (controller area network) bus

The invention discloses a method for safety communication of ECUs (Electronic Control Unit) in a CAN (controller area network) bus, which comprises the steps that: 1, a system model is established; 2, an GECU (Gateway Electronic Control Unit) loads a session key into a safety storage of the GECU; 3, the GECU carries out session key distribution on each ECU in the CAN bus; 4, a receiver ECUr carries out authentication on an encrypted data frame sent by a sender ECUs; 5, the GECU updates an encryption key and an authentication key which are used for communication, wherein update is mainly divided into two stages of in-vehicle ECU key update and key update when a connection of external equipment is released; and 6, when a vehicle is connected with the external equipment, designing an additional authentication and key distribution method so as to ensure legality of the accessed external equipment. According to the method disclosed by the invention, calculation cost can be obviously reduced, and a load of the CAN bus is reduced; and optimization is carried out for a key distribution protocol in the in-vehicle CAN bus, a key update problem generated when the external equipment is connected and released is considered, a counter is used for generating a random number to change a parameter for key generation, and a relay attack is effectively prevented.
Owner:JIANGSU UNIV

Transport layer security (TLS) channel constructing method based on cryptographic algorithm

ActiveCN103118027ASignature speed is excellentTransmissionKey exchangeSecure communication
The invention relates to the technical field of network safety and provides a transport layer security (TLS) channel constructing method based on a cryptographic algorithm. The TLS channel constructing method includes steps that: a server side launches a request and a client side respond to a hello message, or the client side launches the hello message; the server side responds to the hello message of the server side; the server side transmits an SM2 certificate to the server side and then transmits a hello completing message; the client side receives the hello completing message and then transmits a secret key exchange message; the client side transmits a cipher suite change message and a finishing message, and the server side transmits the cipher suite change message and the finishing message after receiving the finishing message of the client side; and the server side and the client side perform data safe transmission according to the agreed safety parameters after receiving the finishing messages of each other and passing verification. According to the TLS channel constructing method, the cryptographic algorithm is blended into a TLS protocol to perform safety communication, the signature speed is obviously superior to that of a remote signaling alarm (RSA) algorithm by aid of short secret key length, and the TLS channel constructing method is a data safety method with the 2048-bit safety level of the RSA algorithm.
Owner:CHINA FINANCIAL CERTIFICATION AUTHORITY

Encrypted communication method and system of block chain node

The invention provides an encrypted communication method and system of a block chain node. The method comprises the following steps: for a participating node firstly added in a block chain network, afirst user identifier and a first signature private key of the participating node are signed by using a first signature private key of the participating node, and a first adding broadcast message is sent by the block chain network after the timestamp is stamped thereon through a timestamp server; a mining node analyzes the first adding broadcast message to acquire the first user identifier and thefirst signature public key, and performs the legality verification on the participating node according to the first signature public key; a supervision node generates and distributes the first encryption public key and the first encryption private key corresponding to the first user identifier according to the first signature public key; the participating node perform safety communication with the target node based on the first encryption public key and the first encryption private key. Therefore, the public key certificate scheme is combined with the block chain network to guarantee the communication security of the block chain network.
Owner:全链通有限公司

Intelligent reflecting surface energy efficiency maximum resource allocation method based on safety communication

The invention relates to an intelligent reflecting surface energy efficiency maximum resource allocation method based on safety communication, and belongs to the technical field of wireless communication. The method comprises the following steps: S1, constructing a multi-input single-output intelligent reflecting surface cellular communication system based on safety communication; s2, establishinga nonlinear and multivariable coupling resource allocation model taking maximization of the energy efficiency of the multi-input single-output cellular communication system as a target by consideringthe safety rate constraint of a user, the maximum transmitting power constraint of a base station and the continuous phase shift constraint; s3, converting a fractional objective function into an auxiliary variable parameter subtraction form by utilizing a Dinkelbach method, and then decoupling base station beam forming and reflection surface phase shift parameters according to an alternating iterative algorithm; and S4, converting the original non-convex problem into a standard semi-definite programming form, and carrying out solving by using a convex optimization tool. Simulation results show that the algorithm provided by the invention has higher energy efficiency and safety.
Owner:上海秉玉软件技术服务有限公司

Multilink safety communication method based on completion port model

The invention provides a method for supporting multilink concurrence safety communication between a server and multiple clients and relates to a multilink safety communication method based on a completion port model. The method includes that a main worker thread at a communication server is embedded into an application service of a Windows system to run, a transmission control protocol (TCP) communication server is built according to the completion port model, meanwhile a fixed number of communication interface threads are built to conduct communication with the clients in an asynchronous mode, and the parallel processing capability of the server is improved. In an interaction process, after any client builds the TCP connection, two communication parties must adopt a handshake mechanism to ensure connection legality and adopt connection pool queues or local variables to dynamically maintain message serial numbers in the following data receiving and transmitting process, data transmitted by any party on the legal connection are packaged again according to the data package structure definition, and the receiving party adopts a safety verification algorithm to verify the data packages and regroup the plurality of data packages according to the precedence order of the message serial numbers.
Owner:中船凌久高科(武汉)有限公司

Motorcade establishment and management method and system based on block chain and PKI authentication mechanism

The invention belongs to the technical field of safety communication between motorcades in Internet of Vehicles, and discloses a motorcade establishment and management method and system based on a block chain and a PKI authentication mechanism. The method is mainly divided into two parts of motorcade establishment and group key agreement and update; the motorcade establishment part comprises the following main processes of member registration, member identity authentication and group head aggregate signature; and the group key agreement and update part comprises the following main processes ofgroup key agreement and group key update for dynamic joining and exiting of a vehicle. According to the method and the system, the block chain is combined with the PKI authentication mechanism, a problem of identity authentication of the vehicle, a server and an RSU in the Internet of Vehicles is solved; the motorcade establishment is completed based on an elliptic curve, a bilinear pairing technology and an aggregate signature; and the group key agreement and update can be realized based on a DDH difficulty problem, the forward and backward safety is achieved, and the safety of member communication in the motorcade is ensured.
Owner:XIAN UNIV OF POSTS & TELECOMM

Key distribution and authentication methods, devices and systems

ActiveCN107317789AReduce the burden onSolve the problem that it cannot be applied to smart devices that do not support USIM cardsKey distribution for secure communicationSecurity arrangementSecure communicationWeb authentication
Embodiments of the invention provide key distribution and authentication methods, devices and systems. The methods comprise the following steps that a business center server receives a first key request message sent by a user management server, generates a first-layer key of the user management server according to the first key request message and sends the first-layer key to the user management server; and the user management server generates a second-layer key of a terminal device according to the first-layer key and sends the second-layer key of the terminal device to the terminal device in order to make the terminal device and a network authentication server carry out mutual authentication according to the second-layer key. The business center server and the user management server distribute the different keys to each terminal device, each terminal device carries out mutual authentication with the network authentication center based on the respective key, and a communication key of the terminal device and a function network element is finally obtained, a method for establishing a safety communication channel is provided for the terminal device, and the application range is wide.
Owner:HUAWEI TECH CO LTD

Method for safely transmitting data based on wireless network

ActiveCN102421096ATo achieve the purpose of safe transmissionEnsure secure communicationSecurity arrangementSecure communicationSecure transmission
The invention discloses a method for safely transmitting data based on a wireless network. A pair of key factors and a group of key sets are respectively arranged at a system end and an equipment end; during communication of the system end and the equipment end, a sender calculates a check sum of the data to be sent, calculates an authentication identifier (ID) by using the key factors and an equipment identifier, randomly selects a key from the key sets to encrypt the data to be sent, and sends the encrypted data and an adopted key code; and after receiving the data, the receiver acquires the corresponding key from the key sets through the key code, decrypts the data, calculates the authentication ID by using the equipment identifier and the key factors, judges whether the authentication ID accords with the authentication ID which is sent, and judges whether the check sum is accurate if the authentication ID accords with the authentication ID which is sent, so that the data can be safely transmitted. The method has the advantages that: the equipment identifier is fully utilized; functions of dynamic identity identification, data check and transmission encryption are integrated; safety communication of the data can be guaranteed; and presetting of an unrepeatable master key in each piece of equipment is not required.
Owner:XIAMEN YAXON NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products