Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

228results about How to "Improve security strength" patented technology

Metering data transmission system based on identity encryption and data transmission method

The invention discloses a metering data transmission system based on identity encryption, which comprises a host station, a metering terminal and an intelligent electric energy meter, wherein the intelligent electric energy meter encrypts metering data by adopting a working key and sends the metering data to the metering terminal; the metering terminal performs decryption by adopting the working key of the intelligent electric energy meter, then encrypts the metering data to form a ciphertext by using a public key of the metering terminal, generates a signature for the ciphertext, and sends the metering data and ciphertext information to the host station together; the host station verifies the signature by using the public key of the metering terminal, a private key of the metering terminal is generated after the signature is authenticated, and decryption for ciphertext information is performed so as to obtain an information plaintext; the host station generates a control command according to data processing results and encrypts the control command by adopting system sharing parameters and the public key of the metering terminal so as to generate the ciphertext, the ciphertext is sent to the metering terminal after the signature is generated, the metering terminal verifies the signature and the signature is authenticated, and the control command aiming at the intelligent electric energy meter is generated after the private key is adopted to decode the ciphertext and the control command is read; and in addition, the control command aiming at the intelligent electric energy meter is encrypted through the working key of the intelligent electric energy meter and then is sent to the intelligent electric energy meter. The metering data transmission system improves the security for data transmission, and reduces the calculating load of the host station.
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID +1

USB (universal serial bus) identity authentication method based on voiceprint recognition and system thereof

The invention relates to a USB (universal serial bus) identity authentication method based on voiceprint recognition and a system thereof, belonging to the technical field of computer information safety. The system comprises a user terminal and an embedded voiceprint recognition hardware system based on USB, wherein the user terminal and the embedded voiceprint recognition hardware system based on USB are connected by a USB bus; the embedded voiceprint recognition hardware system based on USB comprises a central processing unit for finishing authenticated voiceprint recognition operation, and the central processing unit is respectively connected with a voice acquisition unit, a data storage unit, a power supply management module, a state indication module and a USB interface used for connecting the user terminal. The invention has the advantage of higher safety. The invention also can provide third-party application and service voiceprint certification interface, and can expand to fields, such as internet banks, e-commerce, e-government affairs and the like.
Owner:JILIN UNIV

Multi-protocol industrial communication safety gateway and communication method with gateway applied

The invention relates to a multi-protocol industrial communication safety gateway and a communication method with the gateway applied. In the data communication process, a source gateway encrypts data through a secret key management mechanism module and a VPN encryption and decryption module and then sends the data to a target gateway. The target gateway decrypts the data through the VPN encryption and decryption module, and provides safe detection and control service for data communication through a safety domain safety protection module; if the data are safe, secret key decryption is carried out on application layer data, the types of the application layer data are judged, an application management safety module is used for management if the application layer data are application management data, and an application layer message detecting and filtering module is called for detecting and filtering messages if the application layer data are application layer messages. The mode of combination of the VPN encryption and decryption, the secret key encryption and decryption, and the application layer message detecting and filtering is adopted for communication safety assurance; the safety domain safety protection and the application safety management are adopted for gateway application safety assurance.
Owner:山东华汉电子有限公司

Aircraft platform-based intelligent district safety protection system and intelligent district safety protection method

The invention discloses an aircraft platform-based intelligent district safety protection method, which comprises step: according to distribution of monitoring blind areas in the district, a monitoring center sets a patrol route of the aircraft; when the aircraft works in an automatic mode, the monitoring center controls the aircraft to fly via a base station, images of the district are monitored via a CCD camera of the aircraft along the set patrol route, and the images obtained through monitoring of the CCD camera are transmitted in real time to the monitoring center via the base station; the aircraft uses the equipped infrared camera thermal imaging principle and adopts the face recognition technology to judge whether a person exists in the patrol route, if yes, the aircraft stops in the air for a certain time and transmits an announcement instruction to the monitoring center via the base station, and if not, patrol operation is continued. Monitoring can be executed on places at which no one can arrive via the CCD camera, and the safety protection range is increased; and through the thermal imaging principle of the infrared camera and the face recognition technology, the district safety protection strength is enhanced.
Owner:HUAZHONG UNIV OF SCI & TECH

Novel authentication mechanism for encrypting vector

The invention discloses a novel vector encryption authentication mechanism and relates to a vector cryptography method, belonging to the technical field of information security. The method comprises the following steps: a cipher system selects a large number encryption key space M which is twice divided into 2*2 encryption key subspaces which are provided with 2 vectors with different orientations in order that each cipher system of the system possesses a unique encryption key subspace and a unique decryption key subspace; according to the method, the novel vector encryption authentication mechanism can be constructed; the mechanism adopts a hardware tamperproof encryption key generation / regeneration technology to realize the secondary division of the large number encryption key space and endow the encryption key with vector property; and the mechanism adopts a dissymmetrical symmetric algorithm array for encryption / decryption, thereby realizing high strength security, anti-replay, integral control, identity authentication and digital signature and having no problem of the management of the encryption key.
Owner:冯振周

Enhanced encryption and integrity protection method

The invention discloses an enhanced encryption and integrity protection method, and belongs to the field of network communication. The method comprises the following steps of: 1) allocating a 4-bit algorithm identifier to each algorithm supported by an LTE / SAE system in advance, wherein the algorithm identifier comprises a key length of the highest bit identification algorithm; 2) performing algorithm negotiation on a key negotiation layer to determine an algorithm used for communication between entities, wherein the entities comprise user equipment, an access network and a core network; 3) calculating a communication key by using the entities according to the negotiated algorithm and a permanent key, and determining the length of the exported key according to the algorithm identifier in the calculation process; and 4) in the communication process, performing encryption or integrity protection on messages according to the negotiated algorithm and the exported key. Compared with the prior art, the method improves the strength of algorithms supported by the system and the flexibility of an encryption and integrity protection mechanism.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Motorcade safety management system and method based on ring signature and vehicle management platform

The invention belongs to the technical field of Internet of Vehicles, and discloses a motorcade safety management system and method based on ring signatures, and a vehicle management platform. identity-based ring signatures are performed on the identities of motorcade members on the basis of an elliptic curve. Hiding and public key updating are conducted on identities of motorcade members throughthe elliptic curve, the block chain and the ring signatures, the identities of the message senders are authenticated, and session keys are updated; the block chain is utilized to publish a public keycertificate and a reputation value of the vehicle; The vehicle inquires the public key, the public key validity and the current reputation value of the surrounding vehicles through the roadside unit,so that the addition of malicious vehicles is avoided; Updating of the public key can prevent information from being intercepted and tampered by malicious vehicles when the private key of the user issubjected to security threats. The privacy of registered users and the privacy of motorcade members are effectively prevented from being leaked, and the communication safety of the members in the motorcade is ensured.
Owner:XIAN UNIV OF POSTS & TELECOMM

Networked transaction certification system and method

The invention discloses a networked transaction certification system which comprises an encryption authentication device, a networked computing device and a transaction system device, wherein the encryption authentication device is connected with the transaction system device through the networked computing device, the networked computing device is used for receiving request transaction information submitted by a user, and transmitting the request transaction information to a transaction system device; the transaction system device is used for generating a random code according to the request transaction information, and searching an elliptic curve password public key corresponding to the user in a user database, and the transaction system device is also used for encrypting request transaction information and a random code by using the elliptic curve password public key, transmitting the encrypted ciphertext to the networked computing device, and storing the request transaction information and the random code into a transaction information database. The invention can realize confidentiality and integrity of a message, authenticity of a transaction entity and non-repudiation of transaction, and has the characteristics of high safety, capability of avoiding transaction hijacking, transaction falsification and remote control.
Owner:北京信安世纪科技股份有限公司 +1

Anti-leakage CP-ABE method under strategy hiding and outsourcing decryption

The invention discloses an anti-leakage CP-ABE (Ciphertext Policy-Attribute-Based Encryption) method under strategy hiding and outsourcing decryption. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption mainly realizes a CP-ABE scheme with three characteristics: leakage resistance, strategy hiding and outsourcing decryption, and belongs to the information safety field. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption utilizes a composite number order bilinear group to construct parameters, and adds the elements in a sub group Gp2 of the composite number order bilinear group in the main public key and the encryption algorithm to achieve the effect of hiding the access strategy. Besides, the algorithm decomposes the decryption process and adds an outsourcing decryption algorithm, and at the same time utilizes a double key system to enable the third party to be unable to completely decrypt the cryptograph, thus reducing the computing cost and guaranteeing safety of the user private key and the cryptograph. Compared with traditional anti-leakage scheme, the anti-leakage CP-ABE method under strategy hiding and outsourcing decryption has the advantages of leakage resistance, strategy hiding, outsourcing decryption, and higher safety, and greatly reduces the computing cost for decryption for the user.
Owner:NANJING UNIV OF POSTS & TELECOMM

Data security authentication method between cloud and edge node

The invention provides a data security authentication method between a cloud and an edge node, and the method provides a bidirectional identity authentication protocol between the edge node and the cloud, can guarantee the authenticity and effectiveness of the identities of the cloud and the edge node, prevents malicious attacks from permeating into a core network, and greatly guarantees the industrial Internet security. According to the method, an elliptic curve cryptographic algorithm is introduced to encrypt key data in an authentication process; the algorithm key size, the system parameters and the storage space are relatively small; operation speed is high, the highest safety intensity per bit is realized; the method is suitable for an authentication environment of edge computing nodes with limited computing resources and storage resources. According to the method, the data plaintext transmission leakage risk is avoided, the replay attack is avoided through the timestamp, the hashiterative operation of the one-time password authentication protocol is simplified, compared with the original authentication protocol, the security is higher, the operation efficiency is also improved, and the authentication security requirement can be met under the environment that the edge node resources are limited.
Owner:国家工业信息安全发展研究中心

Distribution network embedded telecontrol communication security gateway

The invention discloses a novel secure wireless data communication device, which realizes a remote distribution automation control function in a public network on the premise of ensuring the secure and effective transmission of distribution network data. A distribution network embedded telecontrol communication security gateway is classified into a calling distribution network embedded telecontrol communication security gateway and a called distribution network embedded telecontrol communication security gateway, and comprises a main board (1). A central processing unit (2), at least one read only memory (ROM) module (3), a FLASH module (4), a general packet radio service (GPRS) module (5), a hardware encryption module (6) comprising a digital certificate, a serial interface (7), a power interface (8), a subscriber identity module (SIM) card interface (9) and an antenna (10) are integrated on the main board. The gateway further comprises a management and configuration module, a network access module, an authentication module, a virtual private network (VPN) module, a firewall module and a network serial port conversion module. The gateway can be widely applied in the field of distribution network communication construction.
Owner:ZHUHAI POWER SUPPLY BUREAU GUANGDONG POWER GIRD CO +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products