Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

38results about How to "Guaranteed transmission security" patented technology

Data access method and equipment adopting same

The invention discloses a data access method and equipment adopting the same. In the data access method disclosed by the invention, metadata information is encryption information; when accessing a storage server according to the metadata information, a client side needs to acquire a metadata key according to user identification, and obtain the metadata information by decrypting the encryption information according to the key, therefore, an unauthorized client side can not obtain the metadata key according to the user identification, further the metadata information can not be decrypted, and then the phenomenon that an unauthorized client side accesses a metadata server to acquire metadata information and then accesses the storage server through the metadata information can be avoided.
Owner:JIANGNAN INST OF COMPUTING TECH

Mobile terminal and method for safely sharing picture

The invention provides a method for safely sharing a picture. The method comprises the following steps: acquiring a picture resource; acquiring a sharing mode corresponding to the picture resource, wherein the sharing mode comprises a first safe mode and a second safe mode, the first safe mode is used for saving the acquired picture resource in a hidden directory of a memory card, and the second safe mode is used for encrypting the acquired picture resource to obtain the encrypted picture, sharing the encrypted picture and deleting the acquired picture resource; and processing the acquired picture resource according to the acquired sharing mode. The invention further provides a mobile terminal. Through the adoption of the mobile terminal and the method for safely sharing the picture provided by the invention, a plurality of safe modes for picture sharing are set to prevent other people from stealing the picture uploaded by the user through a network, the security of the picture sharing is improved, the picture laboriously conceived and creatively photographed by the user cannot be stolen by other people.
Owner:NUBIA TECHNOLOGY CO LTD

Multi-database data access method and system and proxy server

The invention relates to the field of information technologies and communication, and discloses a multi-database data access method and system and a proxy server. The multi-database data access method disclosed by the invention comprises the following steps that: access requests to various domain names are divided into a read operation type and a write operation type in advance; the proxy server, which is in the same position area with a client side initiating a domain name access request, detects the operation type of the domain name access request according to the domain name access request of the client side; if the operation type of the domain name access request is the read operation type, the proxy server responds to the domain name access request of the client side through read operation of a local database in the same position area; if the operation type of the domain name access request is the write operation type, the proxy server responds to the domain name access request of the client side through read and write operation of a master database; and data in the master database is regularly synchronized to a slave database in the position area, where various proxy servers are. Compared with the prior art, the read-only operation response speed of the databases is ensured; and furthermore, the database synchronization robustness is ensured.
Owner:LETV HLDG BEIJING CO LTD +1

Monitoring video encryption transmission method, device, equipment and medium

The embodiment of the invention provides a monitoring video encryption transmission method and device, electronic equipment and a storage medium, and is applied to a monitoring access server in the articulated naturality web, and the method comprises the steps: responding to a monitoring check request transmitted by an articulated naturality web terminal in the articulated naturality web, callinga plurality of video data packets acquired by monitoring equipment corresponding to the monitoring check request from the Internet; generating encryption keys respectively corresponding to the plurality of video data packets according to the plurality of video data packets; encrypting the plurality of video data packets by adopting encryption keys respectively corresponding to the plurality of video data packets to obtain a plurality of encrypted video data packets; and respectively sending the plurality of encrypted video data packets and each encryption key to the articulated naturality webterminal through mutually independent data transmission channels, so that the articulated naturality web terminal respectively decrypts the plurality of encrypted video data packets by adopting the corresponding encryption keys. By adopting the technical scheme of the invention, the security of calling the monitoring video from the Internet can be improved.
Owner:VISIONVERA INFORMATION TECH CO LTD

Encryption transmission method for Internet of Things security based on quantum random numbers

The invention relates to the technical field of Internet of Things transmission, in particular to an encryption transmission method for Internet of Things security based on a quantum random number, which comprises the following steps of: 1, a random number generated by a quantum true random number generator is taken as a cipher book, and the same identification code for the cipher book is stored at a hardware end and a server end; 2, after receiving the verification request, the server obtains two groups of cipher book subscript random number sequences from the quantum true random number generator; step 3, the hardware end replces the two groups of cipher book subscript random number sequences with an encryption key and a serial number query key according to the array subscript of the cipher book; 4, when the data is sent, the sending end encrypts the transmission data channel; the receiving end decrypts the received data; and 5, if the transmission sequence number does not correspondto the server, the transmission sequence number is re-acquired through the sequence number query key. According to the encryption transmission method for the Internet of Things security based on the quantum random number, the transmission security of the Internet of Things can be ensured, the performance requirement on an MCU is reduced, and the power consumption requirement is reduced.
Owner:浙江神州量子通信技术有限公司

Service request transmission method and device, and electronic equipment

ActiveCN112291201AIncrease the difficulty of crackingAvoid possible problems in the encryption and decryption processTransmissionEngineeringEncryption decryption
The embodiment of the invention provides a service request transmission method and device and electronic equipment. The method is applied to a client, and comprises the following steps: generating a request identifier corresponding to a service request under the condition of initiating the service request; encrypting the first target data by adopting a first preset algorithm to obtain an encryptedidentifier; signing the second target data by adopting a second preset algorithm to obtain a signature identifier; writing the request identifier, the encryption identifier and the signature identifier into the service request to obtain a target service request; and sending the target service request to a server. In the embodiment of the invention, in the process of transmitting the service request, the request parameter does not need to be encrypted. And meanwhile, adding the request identifier, the encryption identifier and the signature identifier into the service request for the server toverify the service request. And possible problems of the request parameters in the encryption and decryption process are avoided.
Owner:BEIJING 58 INFORMATION TTECH CO LTD

Lightweight certificateless industrial Internet of Things access control method and system

The invention discloses a lightweight certificateless industrial Internet of Things access control method and system. According to the method, a local central server responsible for authorization carries out identity authentication on two parties according to an OAuth thought; different from ACE-OAuth, traditional (such as certificate-based) communication key negotiation needs to be carried out before authentication. According to the method, a local server is used as a trusted third party; two-way authentication between a user and a resource server is realized by using challenge response basedon a public key, a token and a password; communication key negotiation is integrated into an authentication process; the resource server does not need to distribute, receive and verify certificates while the security is ensured; the number of interactive rounds in the authentication process can be effectively reduced, then the communication data transmission amount and the key negotiation calculation consumption including CPU occupation, disk occupation, memory occupation and the like are effectively reduced, and the method is more dominant in safety and practicability and is more suitable for resource-limited environments such as the industrial Internet of Things.
Owner:HANGZHOU DIANZI UNIV

User-defined encryption information transmission method and system

The invention discloses a user-defined encrypted information transmission method and system. The method comprises the following steps: obtaining a first user login permission through a total login platform; judging whether the first user login permission meets a first predetermined requirement or not; if yes, obtaining first user authentication information according to the first user login permission; obtaining a preset authentication verification rule; when the first user authentication information meets a preset authentication verification rule, obtaining a first user setting permission; obtaining a first encryption algorithm according to the first user setting permission, wherein the first encryption algorithm meets a preset authentication verification rule; encrypting the first user setting permission and the first user authentication information through a first encryption algorithm to obtain first encrypted data information; and according to the first encrypted data information and the first user setting permission, obtaining a first execution instruction for sending the first encrypted data information to each subsystem. The technical problems that multiple systems are needed for business handling of financial enterprises, operation is complex, and safety problems exist if login passwords are unified are solved.
Owner:SHANGHAI HANDPAL INFORMATION TECH SERVICE

Method for acquiring node trust value based on detection route in energy harvesting wireless sensor network to avoid black hole node attack

The invention discloses a method for acquiring a node trust value based on a detection route in an energy harvesting wireless sensor network to avoid black hole node attack. In the energy harvesting wireless sensor network, the energy of the nodes, in addition to meeting the data routing energy required for transmitting data packets among the nodes, remains. According to the method, the residual energy of the nodes can be fully utilized, and the detection route is established among the nodes in the network. Establishment of the detection route comprises sending a detection packet and receiving a feedback packet, and because a black hole node cannot correctly distinguish a data packet and the detection packet, malicious packet loss behaviors occur in the transmission process of the detection route, and position information of the detection route is exposed. According to the position information of the black hole node acquired by the detection route, the credibility of the malicious node is reduced, so that the node with higher credibility is selected to transmit the data packet in the transmission process of the next-hop data route. Through calculation of the node trust value, black hole nodes can be effectively avoided, and the data routing success rate of the network is improved. The residual energy of the nodes is fully utilized, and the energy utilization rate of the network is improved.
Owner:CENT SOUTH UNIV

Physical layer secure transmission optimization method and device based on frequency control array

The invention provides a physical layer secure transmission optimization method and device based on a frequency control array, electronic equipment and a storage medium. The method comprises the following steps that a secure transmission rate optimization model is established according to a limited character input signal and a preset channel model; and the preset precoding vector and the preset frequency offset vector in the secure transmission rate optimization model are alternately optimized, the optimized precoding vector and the optimized frequency offset vector are determined, and the optimized secure transmission rate is calculated, so that the security of the physical layer secure transmission system in practical application is improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Unmanned aerial vehicle relay Internet of Vehicles secure transmission method based on non-orthogonal multiple access

The invention discloses a unmanned aerial vehicle relay Internet of Vehicles secure transmission method based on non-orthogonal multiple access. The method comprises the following steps of: firstly, constructing a unmanned aerial vehicle relay Internet of Vehicles model based on non-orthogonal multiple access and comprising one base station, one unmanned aerial vehicle and V network edge vehicles; constructing a physical layer security model among the base station, the unmanned aerial vehicle and network edge vehicle nodes based on the unmanned aerial vehicle relay Internet of Vehicles model based on non-orthogonal multiple access; then, based on the unmanned aerial vehicle relay Internet of Vehicles model and the physical layer security model, constructing an unmanned aerial vehicle relay Internet of Vehicles secure information transmission target and optimization conditions; and finally, obtaining a solution through a golden section method and a graph theory based on the unmanned aerial vehicle relay Internet of Vehicles information secure transmission target and optimization conditions, and constructing an unmanned aerial vehicle relay Internet of Vehicles information secure transmission method. Compared with an existing mechanism, on the premise that the information transmission security is guaranteed, the total data transmission rate from the base station to the vehicle in the unmanned aerial vehicle relay Internet of vehicles can be increased.
Owner:RES & DEV INST OF NORTHWESTERN POLYTECHNICAL UNIV IN SHENZHEN +1

A lightweight certificateless industrial internet of things access control method and system

The invention discloses a lightweight access control method and system for the industrial internet of things without a certificate. According to the idea of ​​OAuth, the local central server responsible for authorization authenticates both parties. Unlike ACE‑OAuth, which requires traditional (such as certificate-based) communication key negotiation before authentication, this method uses the local server as a trusted first Three parties, use public key-based challenge responses, tokens and passwords to realize two-way authentication between users and resource servers, and integrate communication key negotiation into the authentication process, while ensuring security, resource servers do not need to distribute and receive certificates and verification, which can effectively reduce the number of interactive rounds in the authentication process, thereby effectively reducing the amount of communication data transmission and key negotiation calculation consumption, including CPU occupation, disk occupation, memory occupation, etc., which is more advantageous in terms of security and practicability , more suitable for resource-constrained environments such as the Industrial Internet of Things.
Owner:HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products