Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

538 results about "Transmission security" patented technology

Transmission security (TRANSEC) is the component of communications security (COMSEC) that results from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis.

Key management method and system

The embodiment of the invention discloses a key management method and system. The key management method includes the steps: if home terminal equipment detects that a user triggers the operation on opposite terminal equipment, the home terminal equipment sends a key application message to a key management server; according to the received key application message, the key management server generates a session key corresponding to an identifier of the home terminal equipment randomly, and sends the session key to the home terminal equipment; if the home terminal equipment receives the session key, the home terminal equipment sends a communication request to the opposite terminal equipment; according to the identifier of the home terminal equipment included in the communication request, the opposite terminal equipment requests the key management server to acquire the session key corresponding to the home terminal equipment; and if the opposite terminal equipment receives the session key, the opposite terminal equipment gives a response to the communication request and establishes communication connection with the home terminal equipment. The technical scheme of the key management method and system enables both the home terminal equipment and the opposite terminal equipment to safely acquire the session key of the communication of this time, thus improving generation safety and transmission safety for the session key, and guaranteeing safe transmission of the communication content.
Owner:SHENZHEN GIONEE COMM EQUIP

Method for obtaining root key and server

The embodiment of the invention discloses a method for obtaining a root key and a server. The method comprises the steps of obtaining a unique identifier of a security chip carried by root key obtaining request information, wherein the root key obtaining request information is sent by a terminal; encrypting the unique identifier through adoption of a first encryption key and sending the encrypted unique identifier to a service provider server corresponding to the security chip; receiving the encrypted root key returned by the service provider server; decrypting the encrypted root key through adoption of a first decryption key, thereby obtaining the root key corresponding to the unique identifier; encrypting the root key through adoption of a second encryption key and sending the encrypted root key to the terminal according to an identifier of the terminal carried by the root key obtaining request information; and decrypting the encrypted root key by the terminal through adoption of a second decryption key, thereby obtaining the root key. According to the embodiment of the invention, the risk of leaking the root key in a transmission process can be effectively reduced, the transmission security of the root key is improved, and the security of the information in the terminal is improved.
Owner:SHENZHEN GIONEE COMM EQUIP

Intelligent automatic book selling system based on network technology

The invention relates to a book purchase mode and a network-technology-based smart automatic book selling system through organic and integral combination of the working modes of traditional fixed-point sales, network bookstores, vending machines, advertising media launching and logistics management; the book purchase mode is provided for consumers and enables the consumers to select books easily, make payment rapidly and get the book timely; the smart automatic book selling system enables the book providers to easily publish the information and reduce the logistics links in book sales and can reduce the sales cost of books and periodicals and enable capital flow optimized utilization; a book vending machine is arranged at the networks of public places with large crowd flow and comprises an automatic book selling management system, a banking settlement management system, a multi-media advertising management and broadcast system, an intelligent information management system and a network data transmission security management system; the consumers can easily select and purchase books through a display/touch screen; in the case of no consumer register, the book vending machine automatically turns the work state to become a multi-media advertising broadcast carrier; the machine can work for the whole year and has great practicability.
Owner:洪涛

Physical layer security transmission method for keeping relay and jamming node selection result secret

The invention provides a physical layer security transmission method for keeping a relay and jamming node selection result secret. A wireless transmission network in which hacking nodes exist is established and comprises a source node S, a destination node D, M intermediate nodes T<1>, T<2>, ..., T<M>, and the K hacking nodes E<1>, E<2>, ..., E<K>, the whole transmission process includes two stages, wherein in the first stage, the source node broadcasts information s and considers that the information s can be successfully decoded in all the intermediate nodes in the stage; in the second stage, the selected intermediate nodes forward information to the destination node through a decoding forwarding protocol, and jamming nodes transmit jamming information to the hacking nodes. The security outage probability performance of the relay and jamming node selection result is similar to that of an optimal selection result acquired through a method of exhaustion, and the relay and jamming node selection result has high security outage probability performance; only statistical channel state information of a hacking user needs to be acquired in the relay and jamming node selection process, and high practicability is achieved; the relay and jamming node selection result is kept secret to the hacking nodes, and the transmission security of confidential signals is guaranteed.
Owner:XIAN UNIV OF TECH

Network online invoice making method

InactiveCN101894435ASupport online updateSupport offline reportingUser identity/authority verificationCash registersData validationSource Data Verification
The invention provides a network online invoice making method. Based on internet and computer technology, the method provides comprehensive real-time management services for the links of purchase, making, use, inquiry, data application and the like of an invoice of a taxpayer. The method comprises the following steps of: realizing the authentication of a taxpayer identity by using a digital certificate; ensuring the transmission security of invoice data on the internet by using an HTTPS encryption protocol; establishing a security channel between a user and a backstage server; realizing bidirectional data security transmission by encryption technology; generating an invoice security code used for verifying the authenticity and the completeness of invoice face value information by invoice anti-counterfeiting technology. An online invoice making key is a medium for the digital certificate, a face value anti-counterfeiting algorithm and secure storage, and finishes data encryption, data decryption, digital signature, data verification and the like. Therefore, the problems of false invoice, writing false invoice, making an invoice excluding income, filling and making non-standard invoice, declaration data distortion and the like are solved fundamentally.
Owner:INSPUR QILU SOFTWARE IND

Cloud data security protection method adopting fully homomorphic encryption technology and multiple digital watermarking technology

The present invention discloses a cloud data security protection method adopting a fully homomorphic encryption technology and a multiple digital watermarking technology. The cloud data security protection method is characterized in that in a cloud computing environment, a trusted third-party organization distributes a key to a user, after the user stores the key, a fully homomorphic encryption scheme is adopted to encrypt to-be-uploaded data at a user side, then the encrypted data is uploaded to a cloud side, thereby ensuring transmission security and storage security of data; in addition, when the user searches for data, direct search for ciphertext can be performed after a search keyword is encrypted, thereby improving search efficiency; and moreover, before the data is uploaded to the cloud side, a fragile watermarking and a robust watermarking are respectively embedded into the to-be-uploaded data, the purpose of embedding of the fragile watermarking is to prevent illegal modification of the data, so as to achieve authentication for integrity of the data, and the purpose of embedding of the robust watermarking is to protect copyright of the data, so as to achieve authentication for copyright of the data.
Owner:JIANGSU BOZHI SOFTWARE TECH CO LTD

Apparatus and method for implementing OTA based on bearer independent protocol

The invention discloses a device for carrying unrelated protocol-based realization of over the air download, comprising a movable network protocol module, a transmission protocol module and a carrying unrelated protocol module, wherein the movable network protocol module is used to store and realize the movable network protocol stack which is used as a data transmission channel; the transmission protocol module is used to store and realize the transmission protocol stack and builds up a transmission layer connection with a far end server end by adopting the transmission protocol; the carrying unrelated protocol module is used to receive the data sent by a client end by the carrying unrelated protocol, send the data of the client end to the far end server by the transmission protocol stack, the transmission layer connection and the movable network protocol stack, receive the data which are sent to the client end by the far end server by the movable network protocol stack, the transmission protocol stack and the transmission layer connection and send the data to the client end by the carrying unrelated protocol, thereby improving the transmission rate and the transmission safety and reliability of the data in the over the air download.
Owner:ZTE CORP

Virtualized cloud cipher machine system based on cloud computing, and implementing method thereof

The invention discloses a virtualized cloud cipher machine system based on cloud computing, comprising a physical module, a proxy service module, a virtual cipher machine and a secure API interface, wherein one end of the proxy service module establishes a two-way communication connection with the physical module, and the other end establishes a two-way communication connection with a plurality ofmutually independent virtual cipher machines isolated by the virtualization technology; and the secure API interface is used for encapsulating cryptographic operations and internal key management, thereby providing a channel for the cryptographic operation of the client of the virtual cipher machine. The virtualized cloud cipher machine system based on cloud computing realizes the combination ofthe cryptographic algorithm operation, resource management and key management mechanism, so that the use of the cryptographic technology is more centralized, standardized, and easier to manage, and atthe same time, the cryptographic machine resources are allocated to the user remotely through the network, and the encryption technology is utilized to guarantee the transmission security by one password at one time, thereby ensuring the highest security of the customer data and ensuring the security of the key.
Owner:西安得安信息技术有限公司

Method and system for improving transmission security of file

The invention discloses a method and a system for improving the transmission security of a file. The method comprises the following steps of: respectively obtaining a first secret key and a second secret key, which are corresponding to each other, in a secret key server according to a friend identifier in triggering information; encrypting the file by a generated session key to generate a file ciphertext; respectively encrypting the session key by the first secret key to generate a corresponding session ciphertext; forming the friend identifier, the corresponding second secret key, the session ciphertext and the file ciphertext into a file packet; and obtaining and analyzing the file packet, outputting the second secret key which is obtained in an analysis way and is corresponding to a receiver when data which accords with a preset format is analyzed and the receiver is a transmitting friend, receiving a third secret key which is generated by a secret key generator according to the second secret key, deciphering the session ciphertext by the third secret key, and deciphering the file ciphertext by the session ciphertext which is obtained in a deciphering way. Therefore, the operation for transmitting the file to a plurality of users can be simplified, and the transmission security of the file can be further improved.
Owner:FEITIAN TECHNOLOGIES

Block chain-based data transmission system and method

The present invention discloses a block chain-based data transmission system and method. The system comprises a bottom transmission framework module, a data security service module, a transmission security service module, and an interface module. The bottom transmission framework module is used for forwarding data between a block chain and multiple service terminals. The data security service module is in communicated connection with the bottom transmission framework module, and is used for performing security authentication on data transmitted with the bottom transmission framework module in a communicated manner. The transmission security service module is in communicated connection with the data security service module and is used for transmitting and managing data transmitted with the data security service module in a communicated manner. The interface module is in communicated connection with the transmission security service module and at least one service terminal, and is used for being invoked by at least one service terminal so as to start the data transmission system of the block chain. The data in transmission is not tampered, private data can be encrypted and transmitted safely, and block chain-based massive data transmission is safe and efficient.
Owner:中金数据(武汉)超算技术有限公司

Method and system for encryption transmission electronic control unit (ECU) objective file

The invention provides a method and a system for encryption transmission an electronic control unit (ECU) objective file. The method for encryption transmission the ECU objective file comprises the following steps: setting an encryption algorithm, generating a C source code which is used for encryption operation and decryption operation, and integrating the C source code of the decryption algorithm and a secret key to the ECU; when the objective file is generated, adopting an advanced encryption standard (AES) encryption algorithm which is achieved by C language to encrypt the objective file and to generate the ciphertext of the objective file; using a refreshing tool the objective file which is in a ciphertext form pass through a controller local area network controller area network (CAN) bus, transmitting the ciphertext of the objective file to the ECU; the ECU decrypts the objective file after encryption based on a deciphering algorithm and a secret key to generate the objective file, and storing the objective file into the refreshing tool. The method for encryption transmission the ECU objective file guarantees the objective file to exist in the ciphertext form in a transmission link by encrypting on the generated objective file and deciphering until the objective file is received by the ECU end, and therefore the transmission security of the objective file is greatly improved.
Owner:BEIQI FOTON MOTOR CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products