Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "Secure coding" patented technology

Secure coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. Through the analysis of thousands of reported vulnerabilities, security professionals have discovered that most vulnerabilities stem from a relatively small number of common software programming errors. By identifying the insecure coding practices that lead to these errors and educating developers on secure alternatives, organizations can take proactive steps to help significantly reduce or eliminate vulnerabilities in software before deployment.

Second-generation ID card online inquiry system and method based on secure network

InactiveCN101656748ASolving the full range of mobile online applicationsRealize remote secure deliveryUser identity/authority verificationSpecial data processing applicationsRelevant informationNetwork link
The invention discloses a second-generation ID card online inquiry system based on a secure network, comprising an on-line service terminal, a secure network link module, an identification authentication and right management server and an identification relevant information database, wherein the on-line service terminal comprises a mobile multi-interface read module, a secure coding and decoding module and a terminal set, wherein the mobile multi-interface read module and the secure coding and decoding module are both connected to the same terminal set; the terminal set is connected with the identification authentication and right management server through the secure network link module; and a high-speed data link exists between the identification authentication and right management serverand the identification relevant information database. After the mobile multi-interface read module finishes reading a second-generation ID card, an identification information authentication inquiry request initiated from the terminal set by an operator is coded by the secure coding and decoding module and sent to the identification authentication and right management server by the secure networklink module, then information is obtained from the identification relevant information database after identification authentication and right judgment, and the information is fed back from the securenetwork link module to the terminal, thereby movably finishing the on-line authentication and inquiry of personal information with high security.
Owner:上海申远投资管理有限公司

Information protection method and system of sensitive content data

The invention relates to an information protection method and system of sensitive content data. The method comprises the first step of designing a genetic word stock file, wherein the file comprises characters and security codes of the characters, and a several-for-one mapping relation is formed between the security code of each character and a standard code of the character in a standard word stock; the second step of setting the genetic word stock file into an embedding-forbidding mode, and conducting whole encryption and afterwards storing the encrypted file into a server instead of conducting installing directly in an operating system of a client side; the third step of converting the standard codes in the standard word stock into the security codes of corresponding characters in the genetic word stock, and converting the characters of the standard codes corresponding to the sensitive content data which needs to be protected into the characters of the security codes and afterwards storing the characters; the fourth step of deploying a printing and monitoring service program in the client side, intercepting content data of a printed file in real time, and filtering out the protected sensitive content data. According to the information protection method and system of the sensitive content data, the problem in the prior art that the safety is relatively low existing in the aspect that data leakage is prevented through a safe word stock encryption technology is solved.
Owner:李晓妮

Unconditional physical layer secure cooperative transmission method based on interference alignment technology

ActiveCN106100710ARealize transmissionAvoid the risks of exchanging keysSpatial transmit diversityChannel estimationBinary-safePhysical layer
The invention provides an unconditional physical layer secure cooperative transmission method based on interference alignment technology. The method comprises the steps that networking and carrying out time-frequency synchronization are carried out at first, and a master control terminal is selected; all transmitting terminals sequentially transmit channel training signals; a receiving terminal carries out estimates a channel state and transmits the channel state to the master control terminal; the master control terminal calculates a precoding matrix and an interference suppression matrix, and then transmits the same to the other transmitting terminals and the receiving terminal; each transmitting terminal carries out binary secure coding on the original business flow, and the encoded bit stream is used as business input to carry out interference alignment transmission; and the receiving terminal carries out secure decoding on the received binary stream to acquire information stream of a user. Compared with the traditional scheme of encrypted and decrypted transmission based on keys, the risks brought by exchanging the keys are avoided firstly, secondly the error rate of an illegal user can approach 0.5 on the theory, so no valid information can be acquired from the information theory significance, and the complexity is relatively low.
Owner:NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP

Image compression secure coding method based on multidirectional sparse representation

The invention discloses an image compression secure coding method based on multidirectional sparse representation, comprising the following steps of: performing discrete dual-tree wavelet transform on an image and then performing directional filtering on each obtained high-frequency sub-band to obtain fine image directional sparse representation; performing rarefaction process on an obtained directional sub-band coefficient by using a noise shaping technology; interleaving the coefficients of each layer to ensure that the sub-band coefficients of neighbor layers have a parent child relation, and then performing quantitative coding on the coefficients by using SPIHT (Set Partitioning in Hierarchical Trees); and finally encrypting the coefficient symbols in a code stream in an XOR (Exclusive OR) manner and encrypting other partial code streams by using random arithmetic coding. As the code stream obtained by coding is encrypted by using the random arithmetic coding, the encryption efficiency is high, the effect is good, the security is high and no influence is brought to the image compression performance. The high-frequency components of the image are decomposed by using a directional filter, and therefore the directional representation is more flexible, sparser image representation is obtained, the image coding compression process is favored and the decoded image has better objective quality and subjective effect.
Owner:SOUTHWEST JIAOTONG UNIV

Information transmission method with combination of artificial scrambling and LDPC secure coding in satellite-ground link

The invention relates to an information transmission method with combination of artificial scrambling and LDPC secure coding in a satellite-ground link, and belongs to the technical field of satellite communication. The method includes: step 1, calculating a state vector of a main channel; step 2, calculating a state information matrix of the main channel; step 3, performing LDPC coding on to-be-sent information; step 4, constructing artificial noise z orthogonal to the main channel; step 5, calculating a sending weight of the to-be-sent information, wherein the sending weight enables a private interruption probability to be minimum; step 6, continuously sending the coded to-be-sent information, and sending the artificial noise by employing a multi-antenna emission mode; and step 7, performing decoding by employing a BP decoding algorithm by a receiving end. According to the method, in an information transmission process, channel state information is introduced to LDPC coding so that the security and the reliability of communication are guaranteed; the coding method based on the channel state information is employed so that problems during the application of the conventional encryption algorithm in the satellite communication process is avoided; and the complexity of satellite secret communication is reduced.
Owner:NORTHEASTERN UNIV

Secret communication transmission method and device and electronic equipment

An embodiment of the invention provides a secret communication transmission method and device and electronic equipment. The method comprises the steps: obtaining to-be-transmitted original information, carrying out the coding of the original information through employing a Yongquan coding method, and obtaining a plurality of coding data packages and coding matrixes corresponding to the coding datapackages; respectively transmitting the plurality of coded data packets and the plurality of coding matrixes to different onion routes for transmission by using a reverse multiplexing method, whereinany coded data packet and the coding matrix corresponding to the coded data packet are transmitted separately. According to the method provided by the embodiment of the invention, the Yongquan codingmethod is used for safely coding the original information of the sending end, the coded data and the matrix data are separately transmitted, the reverse multiplexing technology is used for sending the coded data packet, and therefore the safety of the data is enhanced at the coding and decoding level; onion routing is also adopted to transmit each coded data packet and each coding matrix, encryption processing is also carried out in the transmission process, and the data security is also ensured in the transmission channel level.
Owner:TSINGHUA UNIV

Privacy protection method in edge computing environment

The invention discloses a privacy protection method in an edge computing environment, which is realized based on security coding of an orthogonal vector and comprises the following steps: acquiring parameters of a network where security coding edge computing based on the orthogonal vector is located; partitioning input data of one side of a calculation task by using a task allocation algorithm, adding a random block code, and allocating to a corresponding edge node; calculating a base vector of a null space vector of the coding matrix, and sending a base vector of a part of null space to userequipment according to the parameter of the A; after a user inputs data, generating an online calculation demand and after receiving all intermediate results returned by edge nodes, enabling a user todecode the intermediate results by using the coefficient coding matrix to obtain a required result. In edge calculation based on security coding, privacy of both sides of calculation is protected byadopting linear coding and adding random blocks, and meanwhile, the random blocks added by a user side are designed by utilizing orthogonality of a null space vector, so that communication load and decoding complexity are reduced, and low-delay, efficient and safe edge calculation privacy protection is obtained.
Owner:SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products