Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32results about How to "Increase the cost of cracking" patented technology

Network authentication method and system based on data link encryption transmission

The invention relates to a network authentication method and system based on data link encryption transmission. The method is characterized in that the network link data are encrypted by the asymmetric algorithm and then transmitted, which avoids network monitoring and input; the network identity information is the specific device hardware and software information and has the uniqueness; a network key and the identity information are updated during starting the network authentication, in order to limit the ageing cycle of the network transmission key and the identity information; the symmetric encryption algorithm is carried out for random authentication, namely, real-time authentication, and thereby, the difficulty at breaking the data monitoring is raised, and transferring the device to other place to operate after the identity is authenticated successfully is effectively prevented. With the adoption of the method and system, the link can be effectively prevented from being monitored, and authentication files are prevented from releasing and spreading; once the authentication files are released and used and a legal user feeds back timely, a server can timely find out the device network information of a device end.
Owner:RUN TECH CO LTD BEIJING

Cryptographic algorithm customizing method

ActiveCN104052595AReduce development cost and difficultyIncrease the cost of crackingSecuring communicationAssessment methodsData processing
The invention discloses a cryptographic algorithm customizing method. The cryptographic algorithm customizing method is characterized in that a customizable cryptographic algorithm functional element, a variable cryptographic algorithm data processing structure, a cryptographic algorithm design constraint rule and a cryptographic algorithm safety assessment method are provided, based on the cryptographic algorithm design constraint rule, the cryptographic algorithm functional element and the cryptographic algorithm data processing structure are specifically configured by a user, so that a customized cryptographic algorithm is obtained, a set of cryptographic algorithm safety assessment method is used for conducting safety assessment on the customized cryptographic algorithm, and if the assessment result meets the algorithm design requirement, the obtained cryptographic algorithm is a target cryptographic algorithm; otherwise, configuration information is adjusted, a novel customized cryptographic algorithm is produced again, and the safety is assessed until the customized cryptographic algorithm meets the design requirement. By the adoption of the method, the safety customized cryptographic algorithm can be efficiently designed by the user.
Owner:戴葵

Dynamic encryption method for Internet of Things device based on login serial number

The application discloses a dynamic encryption method for an Internet of Things device based on a login serial number. The method includes steps: the Internet of Things device generates a first dynamic secret key; the Internet of Things device encrypts a login message by employing the generated first dynamic secret key and obtains an encrypted login message; the Internet of Things device transmitsthe encrypted login message to an Internet of Things platform; the Internet of Things platform receives and verifies the encrypted login message, and generates a login reply message after verification; the Internet of Things platform transmits the login reply message to the Internet of Things device; the Internet of Things device receives and verifies the login reply message; and bidirectional identity authentication of the Internet of Things device and the Internet of Things platform is successful, and the Internet of Things platform and the Internet of Things device mutually transmit ordinary data messages. According to the method, the pseudo-random dynamic secret key is generated through a static secret key and the login serial number of the Internet of Things device, and the securityof communication between the Internet of Things device and the Internet of Things platform is improved.
Owner:TAIHUA WISDOM IND GRP CO LTD

Method and device for authenticating terminal as well as EOC (Ethernet over Coax) terminal

The invention relates to a method and device for authenticating a terminal as well as an EOC (Ethernet over Coax) terminal. The method for authenticating the terminal comprises the following steps of: acquirement: acquiring characteristic domain information of the EOC terminal and first encryption control domain information which is prestored in the EOC terminal and generated according to a preset key and encryption algorithm based on the characteristic domain information; calculation: generating second encryption control domain information according to the preset key and encryption algorithm based on the characteristic domain information; and authentication: judging whether the first encryption control domain information and the second encryption control domain information accord with the preset authentication passing rule or not, allowing the EOC terminal to pass the authentication if the first encryption control domain information and the second encryption control domain information accord with the authentication passing rule; or otherwise, not allowing the EOC terminal to pass the authentication. The invention can achieve the purpose of carrying out the authentication control on the terminal on the basis of not increasing the terminal cost.
Owner:NEW H3C TECH CO LTD

Encryption key generation and encryption method, decryption key generation and decryption method

The invention discloses an encryption key generation method, an encryption method, a decryption key generation method and a decryption method. The encryption key generation method comprises the following steps: acquiring a first key factor; setting a first fixed key, wherein the first fixed key is preset and stored in the encryption equipment; negotiating a first dynamic key, and negotiating between the encryption equipment and the decryption equipment by the first key negotiation method according to the first configuration parameter to obtain the first dynamic key; performing first logical operation on the first key factor, the first fixed key and the first dynamic key to obtain a first encryption key; and performing hash operation on the first encryption key to obtain a second encryptionkey, wherein the second encryption key is used for encrypting data. According to the encryption key generation method provided by the invention, one-packet-one-key are realized, the complexity of theencryption key is high, the security of data transmission is improved, the cracking difficulty is improved, the generated encryption key does not need to be repeatedly set in the data transmission, and the network data transmission performance is ensured.
Owner:西安瑞思凯微电子科技有限公司

Image encryption method based on chaotic mapping and chaotic S-box substitution

The invention provides an image encryption method based on chaotic mapping and chaotic S-box substitution in the technical field of image encryption, and the method comprises the steps: S10, obtaining a color image file, carrying out the Hash calculation, obtaining a Hash value, and calculating a system parameter based on the Hash value; step S20, generating four initial values of four-dimensional hyper-chaotic mapping based on the Hash values, and further obtaining four groups of chaotic pseudo-random sequences; s30, extracting a sequence Wz based on the chaotic pseudo-random sequence and system parameters, and generating a chaotic S box by using the sequence Wz and the S box using the AES algorithm; step S40, performing Arnold scrambling on the color image file to obtain a scrambled image, and performing byte substitution on the scrambled image by using a chaos S box to obtain a substituted image; and S50, performing image diffusion encryption on the three components of the RGB in the substitution image by using the chaos pseudo-random sequence and the system parameters to obtain three pieces of ciphertext data, and obtaining an encrypted image based on each piece of ciphertext data. The method has the advantage that the security of image encryption is greatly improved.
Owner:HUAQIAO UNIVERSITY

Method for generating anti-counterfeiting unique code and performing anti-counterfeiting authentication

The invention discloses a method for generating an anti-counterfeiting unique code and performing anti-counterfeiting authentication. The method includes: generating the anti-counterfeiting unique code, to be more specific, preparing an anti-counterfeiting material, printing and solidifying the anti-counterfeiting material onto a product or a product package, shooting an anti-counterfeiting imagefile in a magnifying manner, performing storage and transmission, performing automatic identification by an image-text identification system, automatically generating and storing the anti-counterfeiting unique code, and generating and printing a commodity identification code; performing anti-counterfeiting authentication, wherein the anti-counterfeiting authentication is performed by scanning thecommodity identification code, inquiring an authenticity inquiry system, directly magnifying and observing the image content of the anti-counterfeiting material for rechecking and the like. The methodhas the advantages that multiple anti-counterfeiting measures are set during the generating of the anti-counterfeiting unique code, a multiple anti-counterfeiting authentication function is achieved,and counterfeiting preventing and authentication are linked with each other; anti-counterfeiting authentication manners are diversified, mutual corroboration of the different anti-counterfeiting authentication manners can be achieved, reverse copying and cracking is difficult, and good anti-counterfeiting performance is achieved; the method is convenient to use and especially suitable for the reliable counterfeiting preventing of high-value commodities in the intelligent Internet era.
Owner:福州固钛光电科技有限公司

Security authentication method and system based on security chip and security chip

The invention relates to a security authentication method and system based on a security chip and the security chip, and belongs to the technical field of security communication. The security authentication method comprises the steps that (1) a security chip sends a key acquisition request to an auxiliary chip in response to a security authentication request sent by an upper computer; (2) the auxiliary chip sends first ciphertext data encrypted by the security key to the security chip in response to the key acquisition request; and (3) the security chip decrypts the first ciphertext data to obtain a security key, and performs security authentication with the upper computer in combination with the code table data stored in the security chip. A security key and code table data required by security authentication are separately stored in a security chip and an auxiliary chip, so that the chip cracking difficulty is increased, the information security is improved, and the method can be widely applied to the field of communication and authentication equipment.
Owner:ZHEJIANG GEOFORCECHIP TECH CO LTD

A third party secure access method in the form of a service provider H5 application

ActiveCN109831432AControllable development costsOnline fastTransmissionService providerThird party
The invention discloses a third party secure access method in an H5 application form of a service provider. The method comprises a third party backend, a service provider H5 end, a service provider gateway server side, the service provider authenticating end and the service provider back end; all ends are interacted.According to the invention, the problems of data leakage when the service provideraccesses the third party, data usage uncontrollability, increasement of the size of a third-party APP, access period long process complexity, and high development cost are solved. The invention provides a third party secure access method and system in an H5 application form of a service provider. When the method is applied, the whole H5 application is developed by a service provider, data cannotbe leaked to any third party, the problems that the size of a third party APP is increased and republishing is needed do not exist, the complexity is increased by adding random numbers, Hash, an AES encryption algorithm, public key and private key encryption and decryption and the like, and the cracking cost of the whole method is very high.
Owner:CHONGQING RURAL COMMERCIAL BANK CO LTD

Processor

The invention discloses a processor. The processor comprises a configuration information storage region and a recombination control unit; the configuration information storage region is used for storing configuration information, and the configuration information comprises a recombination rule; the recombination control unit is used for controlling a connection relationship among logic devices inthe processor; and the recombination control unit is used for receiving a control instruction obtained by an application which is running in the processor through decoding, selecting the correspondinglogic devices to form a recombination circuit for executing the control instruction according to the recombination rule in the configuration information storage region, thereby realizing execution ofthe control instruction. The processor can control the logic devices forming the recombination circuit; and when one control instruction is realized, the processor can select the logic devices to beconnected to form different recombination circuits according to the recombination rule as needed, so that the cracking cost of the control instruction execution process is effectively reduced, the execution security of the control instruction corresponding to the application, in the processor, in the running process is improved, and the processor is securer and more stable.
Owner:北京多思科技工业园股份有限公司

Security policy version generation method

The invention provides a security policy version generation method, which belongs to the field of computer technology and information security, and comprises the following steps that: a security policy version consists of a plurality of security policy rules, and each security policy rule consists of an algorithm, a secret key and a policy identifier; wherein the security policy version is dividedinto a security policy initial version and a security policy use version; wherein the security policy use version is generated through a security policy initial version, an increment factor and a PCode operation; wherein the PCode comprises a PCode algorithm function and a PCode operating environment, so that the security policy using version is generated by operation of the security policy initial version, the increment factor and the PCode algorithm function in the PCode operating environment. The security policy version provided by the invention can be dynamically changed and updated, is high in security, is difficult to crack even if the key is intercepted, can be widely applied to subway ticket checking terminals, POS terminals and the like, is also suitable for other automatic terminals with similar key systems, has good commercial value, and is worth popularizing.
Owner:咪付(广西)网络技术有限公司

Man-machine identification method based on sliding puzzle verification code

PendingCN112580012AAvoid exposureIncrease the difficulty of reverse decryptionDigital data authenticationAlgorithmTyping
The invention belongs to the field of user identification of computer information security, and relates to a man-machine identification method based on a sliding puzzle verification code. The method comprises the following steps: a client requests a server base map and a sliding block; the server generates a base map, a sliding block and a unique identification code and returns the base map, the sliding block and the unique identification code to the client; the client generates a verification code UI according to the base map and the sliding block; the client collects the displacement of theuser moving sliding block; the client encrypts the collected data and the unique identification code and sends the encrypted data and the unique identification code to the server; the server decryptsthe encrypted data of the client; and the server authenticates the man-machine and returns an authentication result. The method is distinguished from a traditional image-text verification code, so that a code printing recognition black industry tool is out of action, and a certain confrontation protection effect is achieved; meanwhile, the user does not need to identify graphic and text information and related typing operations, and only needs to drag the sliding block to finish picture splicing to finish verification, so that the user operation is simplified, and the user experience is optimized.
Owner:GUANGZHOU FAISCO INFORMATON TECH

Application obfuscation method and device, server and storage medium

The embodiment of the invention provides an application obfuscation method and device, a server and a storage medium. The method includes: replacing a first class name of a code file in an applicationwith a character string, wherein the character strings used for replacing the same first class name are the same, and character strings for replacing different first class names are different; secondly, searching response, replacing a first class name of a code file in the application with class name mapping information generated by the character string, and determining a target character stringused for replacing a second class name in a resource file of the application, wherein the class name mapping information comprises each first class name in the code file and a character string used for replacing the first class name; and finally, replacing the second class name in the application with the first class name replaced with the target character string to obtain the target application.According to the technical scheme provided by the invention, not only is the cracking cost of the application increased, but also the difficulty of reversely cracking the application is increased, sothat the labor fruits of technicians are protected, and the occurrence of loopholes is avoided.
Owner:ZHEJIANG SUPCON TECH

Processor

The invention discloses a processor. The processor comprises an initialization unit, a configuration information storage area and a recombination control unit. Before an application program is loaded, the initialization unit is used for changing each instruction in the application program according to the pre-set changing rule. The application program with the initial state and the changing rule are saved to the configuration information storage area. The recombination control unit is used for reading corresponding application programs with initial states and changing rules from the configuration information storage area. According to reversing rules of the changing rules, each instruction of the application programs with initial states is subjected to recombination operation. Each instruction subjected to recombination operation is inputted to a decoder for decoding. Obtained control signs are sent to corresponding resources component for execution. The scheme can effectively raise cracking cost of the application programs in the processor. Without changing decoding logic of the decoder, safe instructions meeting requirements of the decoder can be ingeniously inputted to the decoder for decoding through instruction recombination. Therefore, operation safety of the processor is ensured.
Owner:北京多思安全芯片科技有限公司

a processor

The invention discloses a processor. The processor comprises an initialization unit, a configuration information storage area and a recombination control unit. Before an application program is loaded, the initialization unit is used for changing each instruction in the application program according to the pre-set changing rule. The application program with the initial state and the changing rule are saved to the configuration information storage area. The recombination control unit is used for reading corresponding application programs with initial states and changing rules from the configuration information storage area. According to reversing rules of the changing rules, each instruction of the application programs with initial states is subjected to recombination operation. Each instruction subjected to recombination operation is inputted to a decoder for decoding. Obtained control signs are sent to corresponding resources component for execution. The scheme can effectively raise cracking cost of the application programs in the processor. Without changing decoding logic of the decoder, safe instructions meeting requirements of the decoder can be ingeniously inputted to the decoder for decoding through instruction recombination. Therefore, operation safety of the processor is ensured.
Owner:北京多思安全芯片科技有限公司

a processor

The invention discloses a processor. The processor comprises a configuration information storage region and a recombination control unit; the configuration information storage region is used for storing configuration information, and the configuration information comprises a recombination rule; the recombination control unit is used for controlling a connection relationship among logic devices inthe processor; and the recombination control unit is used for receiving a control instruction obtained by an application which is running in the processor through decoding, selecting the correspondinglogic devices to form a recombination circuit for executing the control instruction according to the recombination rule in the configuration information storage region, thereby realizing execution ofthe control instruction. The processor can control the logic devices forming the recombination circuit; and when one control instruction is realized, the processor can select the logic devices to beconnected to form different recombination circuits according to the recombination rule as needed, so that the cracking cost of the control instruction execution process is effectively reduced, the execution security of the control instruction corresponding to the application, in the processor, in the running process is improved, and the processor is securer and more stable.
Owner:北京多思科技工业园股份有限公司

An anti-counterfeiting unique code generation and anti-counterfeiting verification method

The invention discloses a method for generating an anti-counterfeiting unique code and performing anti-counterfeiting authentication. The method includes: generating the anti-counterfeiting unique code, to be more specific, preparing an anti-counterfeiting material, printing and solidifying the anti-counterfeiting material onto a product or a product package, shooting an anti-counterfeiting imagefile in a magnifying manner, performing storage and transmission, performing automatic identification by an image-text identification system, automatically generating and storing the anti-counterfeiting unique code, and generating and printing a commodity identification code; performing anti-counterfeiting authentication, wherein the anti-counterfeiting authentication is performed by scanning thecommodity identification code, inquiring an authenticity inquiry system, directly magnifying and observing the image content of the anti-counterfeiting material for rechecking and the like. The methodhas the advantages that multiple anti-counterfeiting measures are set during the generating of the anti-counterfeiting unique code, a multiple anti-counterfeiting authentication function is achieved,and counterfeiting preventing and authentication are linked with each other; anti-counterfeiting authentication manners are diversified, mutual corroboration of the different anti-counterfeiting authentication manners can be achieved, reverse copying and cracking is difficult, and good anti-counterfeiting performance is achieved; the method is convenient to use and especially suitable for the reliable counterfeiting preventing of high-value commodities in the intelligent Internet era.
Owner:福州固钛光电科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products