Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

85results about How to "Easy to decrypt" patented technology

Method for undetectably impeding key strength of encryption usage for products exported outside the U.S.

In one embodiment, a communication device includes a key strength controlling agent 308 operable to (i) receive a request for a cryptographic key; (ii) determine, from a restriction identifier, whether the cryptographic key strength is restricted; (iii) when the cryptographic key is restricted, cause the use of a second cryptographic key having a second key strength; and (iv) when the cryptographic key is not restricted, cause the use of a first cryptographic key having a first key strength. The first and second key strengths are different.
Owner:AVAYA INC

System and method for encryption and decryption based on quantum key distribution

ActiveUS20170324550A1Facilitate secure encryption and decryptionFacilitating secure encryption and decryptionKey distribution for secure communicationProtocol for Carrying Authentication for Network AccessKey distribution
One embodiment of the present invention provides a system for facilitating storage encryption and decryption. During operation, the system receives a first request to encrypt data which is to be stored on a remote device, wherein the first request indicates the data. The system updates a key based on a dynamic key refreshment protocol. The system determines a key label for the updated key. The system encrypts the data based on the updated key, and transmits the encrypted data and the key label to the remote device, thereby facilitating secure encryption and decryption of data on the remote device.
Owner:ALIBABA GRP HLDG LTD

Key negotiation method and device, and power distribution automatic system

The invention discloses a key negotiation method applied to a power distribution main station of a distribution automatic system, which can obtain the identity label and random number of the power distribution terminal after the two-way identity authentication is completed, and generates a working key according to the identity label, the random number and the root key and sends a control instruction encrypted with the working key to the power distribution terminal, so that the power distribution terminal decrypts the control instruction and returns response information to complete key negotiation. It can be seen that the working key in the present invention is generated according to the identity label and the random number; in different session processes, the random number is different, sothe working key is also different and is not easy for the illegal personnel to crack, thereby greatly improving the safety of the distribution automatic system. Correspondingly, the present inventionalso provides a key negotiation device, a key negotiation method and device applied to the power distribution terminal, and a power distribution automatic system, the functions of which correspond tothe functions of the aforementioned method.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD

Privacy protection type attribute matching method based on symmetrical encryption

The invention relates to a privacy protection type attribute matching method based on symmetrical encryption. According to the method, a secret key is generated by means of common attributes naturally shared by matched users, an establish request and a secure channel secret key are connected through the secret key in an encryption mode, and only the matched users can generate the same secret key, decrypt a message conveniently and obtain a channel secret key; in this way, privacy protection type attribute matching and secure channel establishment are achieved synchronously through one round of communication, accurate and fuzzy matching / searching can be achieved, any privacy information can not be obtained by a participant with a similarity degree lower than the threshold value, an established secure channel can resist man-in-the-middle attack, and meanwhile, the attribute matching mechanism is verifiable so that matching result cheating attack can be resisted. Compared with most existing methods depending on an asymmetric encryption system and a trusted third party, the method has the advantages that calculation cost and communication cost are reduced greatly, calculated amount is small, practicality is high, flexibility is high, and the lightweight purpose is realized.
Owner:RUN TECH CO LTD

Apparatus and method for data encryption

Provided is an apparatus for encrypting data including a key determiner configured to determine a cipher key for white-box cryptography (WBC)-based encryption and a symmetric key different from the cipher key and an encrypter configured to generate a ciphertext of the data using the WBC-based encryption and symmetric-key-based encryption with the symmetric key.
Owner:SAMSUNG SDS CO LTD

Data sending method, data receiving method, sending end and receiving end

The invention provides a data sending method, a data receiving method, a sending end and a receiving end, and relates to the technical field of communication. The sending method comprises the following steps: calculating to-be-sent data by utilizing a message digest algorithm to obtain a first hashed value of the to-be-sent data, splicing the length value of the to-be-sent data to the head and/orthe tail of the to-be-sent data to obtain to-be-encrypted data, encrypting the to-be-encrypted data to obtain first encrypted data, dividing the first hashed value into a plurality of pieces of firstsub-data at an interval of every a second preset number of characters, splicing one piece of first sub-data to the head and/or the tail of a group of to-be-inserted characters to obtain a group of preset characters, sequentially inserting a group of preset characters into the first encrypted data at intervals of a fifth preset number of characters to obtain second encrypted data, and splicing allcharacters of the first hashed value at the head and/or the tail of the second encrypted data to obtain target encrypted data. The data transmission security performance is high, and whether the target encrypted data is tampered or not can be conveniently verified.
Owner:新奇点智能科技集团有限公司

BGV type multi-key fully homomorphic encryption method with directional decryption function

The invention belongs to the field of information security and privacy protection, and particularly relates to a BGV type multi-key fully homomorphic encryption method with a directional decryption function, which comprises the following steps that different users use BGV type homomorphic encryption on plaintext data of themselves to obtain ciphertext corresponding to different keys; user extension is performed on the ciphertext participating in homomorphic calculation to obtain an extended ciphertext of a set (user set S) composed of all users participating in homomorphic calculation; homomorphic operation is performed on the extended ciphertext of the user set S participating in calculation to obtain a result ciphertext; the users participating in calculation carry out directional partial decryption on the result ciphertext respectively, and send partial decryption results to the users needing to be decrypted finally; and a decrypted user is appointed to carry out final decryption toobtain a plaintext result of homomorphic calculation. According to the method, the controllability of the ciphertext decryption result is enhanced, the limitation that MPC related technologies need to be used in the ciphertext broadcasting process is eliminated, and the complexity of the decryption result is reduced.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Approval signature verifying method, mobile device, terminal device and system

The invention discloses an approval signature verifying method, a mobile device, a terminal device and a system and belongs to the technical field of communication. The method comprises the following steps: the terminal device is used for encrypting approval information via anyone of an approver gesture information, a first hand-written signature, first voiceprint information and first fingerprint information which are pre-stored; the mobile terminal obtains decryption information input via an approver, encrypted approval information is decrypted according to the decryption information, the mobile terminal obtains an approver-input signature on the approval information and verifies the signature after the approval information is successfully decrypted, and successful verification information is sent to the terminal device after the signature is successfully verified. The decryption information is obtained via the mobile device, the signature on the approval information is obtained, the approver can complete approval procedures via the mobile device, approving efficiency is improved, a problem that waiting is caused due to failure to complete the approval procedures timely when the approver is on a business trip or cannot have convenient access to the terminal device, and user experience is improved.
Owner:KMERIT SUZHOU INFORMATION SCI & TECH CO LTD

Multivariable public-key encryption/decryption system and method based on hypersphere

The invention discloses a multivariable public-key encryption / decryption system based on a hypersphere. The system includes an encryption module and a decryption module, wherein the encryption module includes a processor and a public-key conversion part which converting plaintext into ciphertext; and the decryption module includes a processor, an affine transformation inversion part I, a trap door part and an affine transformation inversion part II. The trap door part includes a linear equation set construction part and a linear equation set solution part and different parts execute corresponding operations. At last, a group of data is obtained and the group of data is stored and output as decrypted plaintext. If no data is generated by the decryption module, the processor outputs alarm information of decryption error to a user. The system and the method do not use a large-domain technology, and designed center mapping includes N groups of sphere centers used as private keys so as to realize center hiding and at the same time, operation speed is significantly high and a decryption process only requires solution of a linear equation set.
Owner:SOUTH CHINA UNIV OF TECH

Certificate-based end-to-end key exchange method

The invention discloses a certificate-based end-to-end key exchange method. The method comprises the following steps: first step, a terminal I obtains a public key of a terminal II, wherein the specific process is as follows: A1, the terminal I encrypts the public key and submits the same to a server; A2, the server decrypts the public key encrypted by the terminal I, a digital certificate authentication center creates a user certificate of the terminal I, and the server stores the user certificate of the terminal I; A3, the terminal I generates a request message for key exchange with the terminal II; A4, the server sends the user certificate of the terminal I to the terminal II, and after the terminal II agrees to the key exchange request, the server sends the user certificate of the terminal II to the terminal I; A5, the terminal I parses the public key of the terminal II from the user certificate of the terminal I and stores and the same. Similarly, the terminal II acquires the public key of terminal 1. By adoption of the certificate-based end-to-end key exchange method, the key exchange process is simplified, the man-in-the-middle attacks and replay attacks in the registrationprocess are prevented, and the security of the public key is improved.
Owner:河南芯盾网安科技发展有限公司

Embedded device firmware security upgrading method and system, terminal and storage medium

The invention provides an embedded device firmware security upgrading method and system, a terminal and a storage medium, and the embedded device firmware security upgrading method comprises the steps: setting an encryption algorithm library, and storing a plurality of encryption algorithms in the encryption algorithm library; randomly selecting an encryption algorithm from the encryption algorithm library as a primary encryption algorithm to perform primary encryption on an upgrade file, and encoding and packaging the primary encryption file and the primary encryption algorithm into a temporary file; randomly selecting an encryption algorithm from the encryption algorithm library as a secondary encryption algorithm to encrypt the temporary file, and encoding and packaging the encrypted file and the secondary encryption algorithm into an encrypted upgrade file; and sending the encrypted upgrading file to a terminal to which embedded equipment to be upgraded belongs, wherein the encrypted upgrading file is decrypted and decompressed by the terminal and then burnt to the embedded equipment to be upgraded. According to the embedded device firmware security upgrading method and system,the security of the firmware upgrading file can be improved, so that the security upgrading of the firmware of the embedded equipment is realized.
Owner:青岛海米飞驰智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products