Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

47 results about "Static key" patented technology

A cryptographic key is called static if it is intended for use for a relatively long period of time and is typically intended for use in many instances of a cryptographic key establishment scheme. Contrast with an ephemeral key.

FPGA training and inquiry circuit achievement method based on perfect hash algorithm

The invention discloses an FPGA training and inquiry circuit achievement method based on a perfect hash algorithm. The method comprises the following steps of creating a static key value table; conducting first-order hash calculation on static key values and a true random number, and mapping results to a first-order hash table; making the static key values which conflict with one another in the same slot position in the first-order hash table constitute a conflict group, and duplicating the conflict group into adjacent positions of a key value rearranging table; conducting second-order hash calculation on the conflict group to obtain a second-order hash table in which conflict group mapping address index values are mutually different, wherein when serial numbers of the static key values are inquired, the address index values of the static key values are searched in the first-order hash table and/or the second-order hash table, the serial numbers of the static key values are read, and the hash index numbers can be output through serial number query. By utilizing the strong assembly line calculation capability of an FPGA, the size of the mapping space of the conflict group in the second-order hash table is gradually widened through trials from being initially set larger than or equal to 2 of integer power of the least of the conflict number, which drastically saves the volume of the second-order hash table.
Owner:HUAXIN SAIMU CHENGDU TECH CO LTD

Smart key equipment and communication method and system of application software

The invention discloses smart key equipment and a communication method and a system of application software, belonging to the field of data communication. The method comprises the following steps: a connection is established between the smart key equipment and the application software; a single conversion is established between the smart key equipment and the application software and a process key is appointed by the smart key equipment and the application software; the application software uses the process key to encrypt the communication data and transmits the conversion number of the single conversion and the encrypted communication data to the smart key equipment; and the smart key equipment uses the process key corresponding to the conversion number to decrypt the encrypted communication data according to the conversion number of the single conversion so as to obtain plain text communication data. The system comprises a main machine and the smart key equipment. Through establishing the single conversion between the smart key equipment and the application software and using the conventional key to encrypt the communication data and then transmit the encrypted communication data, the problem of the plain text transmission or static key transmission between the current software and the smart key equipment can be solved.
Owner:FEITIAN TECHNOLOGIES

Composite dynamic password authentication method and authentication system applicable to plug-and-play terminal

The invention discloses a composite dynamic password authentication method and an authentication system applicable to a plug-and-play terminal. The method and the system comprise the following steps: providing remote time service to an embedded terminal through a server, and calculating a first key K1 and feeding back the first key K1 to the server according to time factor change T' and a built-in static key C through the terminal; generating a random number group A according to the situation that terminal right is authenticated by using K1 through the server, and calculating second keys K2, wherein the random number group A comprises a change factor ai, and K2 are HASH values of A, T', C and a built-in dynamic key D; receiving K2 through the terminal, comparing K2 with K2' calculated by the terminal, if the result shows that K2 is accordant with K2', determining whether a password is jumped or not according to characteristic values calculated according to T', if the password is jumped, obtaining ai in the random number group A according to a sequence L and a pointer P, calculating a new key D' according to D so as to replace the key, and loading the new key D' into a non-volatile memory. Two time/event synchronous dynamic password modes are adopted simultaneously, the change characteristics of the password are increased, and the method and the system are particularly applicable to bidirectional authentication of plug-and-play terminals and servers.
Owner:赵姗姗

Method for implementing efficient and safe transmission of data between cloud computing servers

The invention discloses a method for implementing the efficient and safe transmission of data between cloud computing servers, and the method comprises the following steps: S1, protocol creating: enabling a system to select Rq=Zq[x]/(xn+1) as a quotient ring with the modulus being a positive integer, selecting a Gaussian distribution Chi*alpha with the standard deviation alpha on Zn and the mean value 0, selecting expressions (shown in the description) as an anti-collision hash function and defining a common parameter pp=(Rq, a, q, H, Chi*alpha), wherein n is a positive integer which is the positive integer power of 2; S2, static key pair generation: transmitting data between a server A<^> and a server B<^>, enabling the servers to generate respective static key pairs (shown in the description) through a secret key generation algorithm; S3, protocol execution: enabling a cloud computing server A<^> and the server B<^> to execute a protocol to finally obtain a shared session key (shownin the description) through negotiation; S4, data transmission: enabling the cloud computing server A<^> and the server B<^> to execute encrypted transmission of communication information through thegenerated session key (shown in the description) and a symmetric encryption algorithm. The method improves the safety through employing ACKN exchange and element encryption transmission while reducingbandwidth, and achieves the dual implicit authentication.
Owner:SOUTH CHINA NORMAL UNIVERSITY

Secret key application method based on SM9 algorithm

ActiveCN112699394ATroubleshoot key escrow issuesTroubleshoot key updatesDigital data protectionAlgorithmKey escrow
The invention discloses a secret key application method based on an SM9 algorithm, and the method comprises the steps that a static secret key management center generates a static secret key of a user based on a user identification according to a secret key generation rule of the SM9 algorithm, and a dynamic secret key management center constructs a dynamic identification of the user through the user identification and a given dynamic change amount, and a dynamic key of the user based on the user dynamic identifier is generated; the user generates a static public key based on the static identifier of the communication opposite side, generates a dynamic public key based on the dynamic identifier of the communication opposite side, and realizes encryption or signature verification operation based on the static public key and the dynamic public key; a user acquires the static private key from the static secret key management center, acquires the dynamic private key from the dynamic secret key management center, and realizes decryption or signature operation based on the static private key and the dynamic private key. According to the key application method, an SM9 key security management mechanism based on SKGC and DKGC is provided, and the problems of key escrow, update and revocation of an SM9 algorithm can be solved.
Owner:FUJIAN NORCA TECH

Method and device for encrypting and encapsulating two-dimensional code breast card with authority

The invention discloses a method and a device for encrypting and encapsulating a two-dimensional code breast card with authority. The method comprises the following steps: setting eight-digit digitalvariables as an activity database ID belonging to the breast card; a dynamic key string being combined; setting the static key used for encryption; setting the unique ID of the customer to which the badge belongs; the unique ID # # permission code # # serial number of the badge ticket belonging to the badge customer being taken as the encoded content string; encrypting the content string to obtainencrypted data; encoding the encrypted data to obtain encoded data; combining the encoded data with the active database ID to which the badge belongs to generate two-dimensional code encapsulated content. The invention has the advantages of low production cost, anti-counterfeiting, high efficiency encapsulation of multiple conference authority, off-line authority correction, technical guarantee for on-site temporary blacklist and invalid badge, and the dynamic key composed of different SHOWIDs is suitable for large-scale standardized application, so as to distinguish different badge attributes of different activities and enhance anti-counterfeiting.
Owner:GUANGZHOU SHISHENG EXHIBITION

Polarization code confidence propagation dynamic flipping decoding method based on key set

PendingCN112104379AImprove decoding performanceControlling and scaling down the number of multi-bit flip attemptsError correction/detection using linear codesTheoretical computer scienceEarly stopping
The invention provides a key set-based polarization code confidence propagation dynamic flipping decoding method, which comprises the following steps of: performing confidence propagation decoding ona polarization code, performing advanced cut-off judgment on a decoding result of each iteration in combination with a cyclic redundancy check auxiliary early stop standard to achieve a preset maximumiteration frequency and CRC (cyclic redundancy check) failure, and obtaining a decoding result of each iteration; and if not, generating a dynamic flipping position in combination with the absolute value of the log-likelihood ratio of the node, further constructing a flipping matrix in combination with the static key set, and improving the decoding performance through bit flipping. Simulation results show that under the condition that the frame error rate is 0.001 and the upset digit omega is 2, compared with a CS omega-based bit upset confidence propagation decoder, the key set-based polarization code confidence propagation dynamic upset decoding method improves the gain by about 0.17 dB, and compared with an original BP decoding algorithm, the key set-based polarization code confidencepropagation dynamic upset decoding method improves the gain by about 0.77 dB.
Owner:SHANDONG UNIV OF SCI & TECH

Graphic user interface apparatus of vehicle-mounted surround view system

The invention relates to a graphic user interface apparatus of a vehicle-mounted surround view system. The apparatus comprises a contact position acquisition module, a static key operation module, a menu operation module, a display module and a data storage module, wherein the contact position acquisition module detects a contact position of a user and notifies a corresponding module to make a response; the contact position comprises a static key region, a dynamic key region and a menu region; the static key operation module makes a response to a contact signal of the user in the static key region; the dynamic key operation module makes a response to a contact signal of the user in the dynamic key region; the menu operation module makes a response to a contact signal of the user in the static key region; the display module performs corresponding 3D graph display according to a response signal of the static key operation module, the dynamic key operation module or the menu operation module; and the data storage module stores data of the vehicle-mounted surround view system and an input number of the user. Compared with the prior art, the apparatus has the advantages of simplicity for operation, intuitiveness, wide view angle, capability of supporting custom operation and the like.
Owner:DELPHI ELECTRONICS SUZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products