Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35results about How to "Implement encryption protection" patented technology

File redirection technology based virtualized security desktop

The invention discloses a file redirection technology based virtualized security desktop. Validity in using the security desktop is guaranteed through a login control module; operation behavior results of users can be reliably protected by an encrypted virtual storage file system; the operation behavior results of the users in the virtualized security desktop are 'internally' redirected to the encrypted virtual storage file system through a user operation middle layer and the whole redirection process is encrypted and monitored under a communication encryption module and a black and white list control module. The virtualized security desktop system is 'totally separated' from an original desktop, operations of adhering, copying, shifting and the like of the files cannot be performed between the virtualized security desktop system and the original desktop; the files on an original desktop system are mapped to the same catalog on the virtualized desktop; results (files, register lists, temporary cache and the like) generated from operation of the users in the virtualized desktop are encrypted for redirection treatment, and all the operations in the virtualized desktop are guaranteed to be safe, reliable and controllable.
Owner:中电科网络安全科技股份有限公司

Quantum encryption microwave relay communication system and quantum encryption microwave relay communication method

The invention discloses a quantum encryption microwave relay communication system and a quantum encryption microwave relay communication method. The system comprises a terminal station I, a relay station, and a terminal station II. The terminal station I is used for performing encryption operation on a key k with a key k1 to generate a key e1 and sending the key e1 to the relay station. The relay station is used for performing decryption operation on the key e1 with the key k1 to generate the key k, performing encryption operation on the key k with a key k2 to generate a key e2, and sending the key e2 to the terminal station II. The terminal station II is used for performing decryption operation on the key e2 with the key k2 to generate the key k. The key k1 is generated by the terminal station I and the relay station through a quantum key distribution terminal. The key k2 is generated by the terminal station II and the relay station through the quantum key distribution terminal. Finally, the terminal station I and the terminal station II have the same key k. The key k is relayed through the process. Through key relay transfer, transfer of the key k from the terminal station I to the terminal station II is realized.
Owner:ANHUI QASKY QUANTUM SCI & TECH CO LTD

Method for encrypting fixed-length data capable of carrying effective service information in transmission

The invention discloses a method for encrypting fixed-length data capable of carrying effective service information in transmission, comprising the following steps: S1, constructing a to-be-encrypted fixed-length original character string; S2, filling specified data bits of the original character string with service information data to get a service information character string; S3, constructing a position exchange code table to disorganize the data bits of the service information character string according to position disorganization rules; S4, inverting the value of the character string after position disorganization; and S5, converting the system of the character string after value inversion according to system conversion rules. Through the method, the problem that the existing popular encryption and decryption algorithm fails to generate a fixed-length character string after encrypting an original character string is solved. According to the method, double modes of encryption in encryption and decryption share encryption and decryption rules and a rule code table, and the rule code table is updated dynamically in variety of ways to increase the cracking difficulty.
Owner:四川智魔王智能科技股份有限公司

Image encryption method and device, image decryption method and device, electronic equipment and storage medium

PendingCN112035847AImplement local encryptionRestrict accessDigital data protectionComputer hardwareEngineering
The invention discloses an image encryption method and device, an image decryption method and device, electronic equipment and a storage medium. The image encryption method comprises the following steps: dividing a to-be-encrypted image into a plurality of rectangular pixel blocks with the same size; taking the rectangular pixel block covered by the area needing to be encrypted as an encryption block; sequentially carrying out intra-block pixel scrambling and inter-block scrambling on all the encryption blocks; and replacing the encryption blocks before scrambling with the scrambled encryptionblocks in sequence to form an encrypted image. The image decryption method includes: dividing the image to be decrypted into a plurality of rectangular pixel blocks with the same size during decryption; determining an encryption block from all the rectangular pixel blocks; performing inter-block reverse scrambling and intra-block pixel reverse scrambling on all the encrypted blocks to obtain decrypted pixel blocks; and replacing the corresponding encryption blocks with the decryption pixel blocks in sequence to form a decrypted image. According to the invention, the user can restrain the access permission of part of people to part of image content. When the condition is allowed, the user or the authorized party restores the original content through the protected image.
Owner:湖北微模式科技发展有限公司

Application encryption method and apparatus

InactiveCN105426712AImplement encryption protectionSolve the problem of leaking user informationDigital data authenticationOperational systemPassword
The invention provides an application encryption method, relates to the field of mobile applications, and solves the problem of user information leakage caused by an operating system of a mobile terminal. The application encryption method comprises the steps of displaying information of an application that is preset to be an encrypted application in an encrypted manner; detecting whether a safety password input by a user is accordant with a safety password corresponding to the application stored in an encrypted database or not; and if so, displaying the application information normally. The technical scheme provided by the invention is applicable to the operating system of the mobile terminal, and the problem of user information leakage caused by the operating system of the mobile terminal is solved.
Owner:ZTE CORP

Information encryption and decryption method and apparatus in short message

The embodiment of the invention discloses an information encryption and decryption method in a short message. The method comprises the following steps: a mobile terminal bottom layer receives at leastone original short message containing privacy information; when the original short message satisfies an encryption condition, the mobile terminal bottom layer encrypts the privacy information in theoriginal short message to generate an encrypted short message, and sends the encrypted short message to a short message application of a mobile terminal; and the short message application of the mobile terminal decrypts the encrypted short message after receiving the encrypted short message. The embodiment of the invention further discloses an information encryption and decryption apparatus in theshort message.
Owner:ZTE CORP

Quick logistics intelligent information encryption method

The invention relates to a quick logistics intelligent information encryption method. A sender logistics management terminal forms an express waybill number-weather number database containing a corresponding relationship between an express waybill number and a weather condition, and respectively encrypts by using different encryption methods to obtain two pieces of secret embedding information; the weather number corresponding to the current express waybill number and the two secret embedding information are fused to obtain intelligent secret embedding information, and the received intelligentsecret embedding information on the express waybill is sent to a logistics company management system by a receiver logistics management terminal; and the logistics company management system feeds back express waybill information (including sender information and receiver information) corresponding to the intelligent secret embedding information to the receiver logistics management terminal, and the receiver logistics outlet arranges personnel to deliver the express waybill. The sender and receiver information on the express waybill is always presented in an encrypted form of intelligent secret embedding information, and only the logistics company management system and the sender logistics management terminal master the personal information of the sender and the receiver, so that the information encryption protection in the logistics process is effectively realized.
Owner:ZHEJIANG WANLI UNIV

Supervisable zero-knowledge proof verification method and system in block chain

The invention provides a supervisible zero-knowledge proof verification method and system in a block chain, and the method comprises the steps: creating a main account of a user through a client, obtaining a main address which is in one-to-one connection with the identity of the user, and recording the main address in a block chain smart contract; generating a public and private key pair of the user according to the main address, and broadcasting the public and private key pair of the user to the whole block chain network; obtaining a secondary address of the user based on the public and private key pair of the user and the public key of the supervisor; performing legality verification on the transaction initiated by the user through the main address recorded by the block chain smart contract; if it is judged that the transaction is legal, executing the transaction; otherwise, enabling the supervisor to judge the relevance between the primary address and the secondary address of the user through ring signature confusion, and obtaining the identity information of the user. According to the embodiment of the invention, the encryption protection of supervisible anonymous and sensitive data of the user identity is realized, and the verification of data authenticity by a consensus node is supported.
Owner:CHINA INTERNET NETWORK INFORMATION CENTER

Java application program encryption method and device

The invention discloses a Java application program encryption method and device, and is applied to the technical field of electronics. The method comprises the following steps: determining a first Tagvalue sequence in a constant pool of a Java application program to be encrypted, and reordering Tag values in the first Tag value sequence to obtain a plurality of second Tag value sequences with different Tag value orders; and replacing the first Tag value sequence with the plurality of second Tag value sequences to form an encrypted Java application program. The technical problems of poor security of the Java application program and leakage of important algorithms and data in the prior art are solved.
Owner:中国移动通信集团陕西有限公司 +1

Database encryption method supporting combinable SQL query

The invention discloses a database encryption method supporting combinable SQL query. The scheme mainly comprises the following steps that: (1) based on an encryption method provided by the invention, a user encrypts and preprocesses data, and uploads an encryption result and preprocessed data to a service provider; (2) an SQL query instruction is set and uploaded: the user uploads a query instruction to a service provider according to an actual demand, and uploads an auxiliary parameter used for querying the instruction at the same time; and (3) data query is performed: the service provider performs SQL query according to a query instruction and auxiliary parameters received from the user, stores a calculation result, updates data and returns a query result to the user. The method can be applied to data encryption storage and encrypted data query in actual life and business, and has the advantages of being high in universality, safe, efficient, capable of protecting privacy, easy and convenient to use, high in efficiency, small in memory and time consumption and the like.
Owner:ZHEJIANG UNIV

An information construction method for notarization to participate in judicial auxiliary affairs

The present invention is an informatization construction method for notarization to participate in judicial auxiliary affairs, which belongs to the technical field of informatization construction methods for notarization in judicial auxiliary affairs; the technical problem to be solved is: to provide an informatization construction method for notarization to participate in judicial auxiliary affairs Improvement; the technical solution adopted to solve the above-mentioned technical problems is: an information construction method for notarization to participate in judicial auxiliary affairs, including the following steps: constructing the overall information architecture of judicial auxiliary affairs: the overall information architecture includes the infrastructure layer, Resource and application support layer, business application layer, display layer, and operation and maintenance management subsystem, information security subsystem, and interface specification subsystem as auxiliary management; build infrastructure layer; build resource and application support layer; build business application layer; Build the display layer; build the operation and maintenance management subsystem; build the information security subsystem; build the interface specification subsystem; the invention is applied to judicial assistance.
Owner:山西瑞呈物联网科技有限公司

Trusted cryptographic module security management method and system

The invention relates to the technical field of information security, in particular to a trusted cryptographic module security management method and system. The authorization role comprises a password manager used for generating a trusted password module key and setting a working mode and administrator authorization data, an administrator used for generating a storage main key and user setting authorization data, and a user used for using password service; when the trusted password module is logged in, physical authorization is carried out on a password manager in a safe environment, and role identification is carried out on an administrator and a user by executing data encryption and decryption through the trusted password module. Authorization roles of the trusted password module are set as the password manager, the administrator and the user, different role tasks are distinct, and physical identification under a safe environment is carried out on the password manager, so that role setting and task distinct can be effectively ensured, illegal users are prevented from logging in and accessing the trusted password module, and role and identification security management in the trusted cryptographic module is ensured.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Informatization construction method for notarization participation of judicial assistant affairs

The invention discloses an informatization construction method for notarization participation of judicial assistance affairs, and belongs to the technical field of informatization construction methods for notarization participation of judicial assistance affairs. The technical problem to be solved is to provide an improvement of an informatization construction method for notarization participation in judicial assistance affairs. The informatization construction method for notarization participation of judicial assistance affairs, wherein the method comprises the following steps: constructing an informatization overall architecture of judicial assistant affairs, wherein the informatization overall architecture comprises an infrastructure layer, a resource and application support layer, a business application layer, a display layer, and an operation and maintenance management subsystem, an information security subsystem and an interface specification subsystem which are used as assistant management; constructing an infrastructure layer; constructing a resource and application support layer; constructing a business application layer; constructing a display layer; constructing an operation and maintenance management subsystem; constructing an information security subsystem; and constructing an interface specification subsystem. The method is applied to judicial assistance.
Owner:山西瑞呈物联网科技有限公司

Media data encryption method based on RTP in VoIP communication network

The invention relates to a media data encryption method based on an RTP in a VoIP communication network, and belongs to the technical field of communication. The method comprises the following steps that SD_A receives an RTP packet and forwards the RTP packet to REU_A; after the REU_A receives the RTP packet, if the REU_A does not find a corresponding TID through FID_A, the REU_A initiates a negotiation request to REU_B; after the REU_B receives the negotiation request, the REU_B completes channel negotiation with the REU_A through the negotiation data, establishes a corresponding channel TIDof the REU_A and the REU_B, and binds the FID_A with the channel TID; and the REU_A finds the corresponding TID through the FID_A, carries out RTP load encryption, and returns the encrypted RTP to theSD_A. According to the method, the media data borne on the RTP can be encrypted and protected no matter what communication protocol is adopted by a signaling plane of the VoIP and no matter encryption equipment is deployed at any position of a communication link.
Owner:XINGTANG TELECOMM TECH CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products