Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

123results about How to "Increase the difficulty of deciphering" patented technology

Path password input method based on contacts

The invention relates to a path password input method based on touch spots, which is as follows: an input device displays a password input matrix on the display screen of the input device; users lay off a path from the password input matrix as a password through a mouse or a touch screen and other input devices, the password input information is transferred to a processor in the input device; the processor of the input device transforms the path password information into letters or figures, then compares the letters or the figures with the pre-stored password in the processor, if matching, the password validation is passed, and if not, the users need to return to re-input the password. The path password input method based on touch spots has the advantages that: the users orderly pass each spot of the password input matrix to form the path as the password, which ensures the password input becomes easy and rapid, improves the memorability of the password and high intensity of the setting,; and the path password does not have any relations with the personal profile, which is not easy to form the password dictionary. The path password input method based on touch spots not only can be used for password input, but also can be used as a short cut for starting a certain program or can be used as a shortcut key of a certain function of the program.
Owner:FUJIAN ETIM INFORMATION & TECH

DNA coding based encryption system and encryption method

The invention belongs to the technical field of information security in communication transmission, and particularly relates to a DNA encryption system and an encryption method. The system comprises an encryption key, an information conversion portion, an information encryption portion, an information transmission portion, a decryption key and an information decryption portion, wherein the encryption key and the decryption key are primer sequences; and information encryption refers to that information is converted and coded and then corresponds to A, T, C, G bases in DNA in a one-to-one mode according to a predetermined rule. The encryption system and the encryption method provided by the invention can realize automatic operation of corresponding code conversion, encryption and decryption by depending on biological problem setting and biological technology development and by being matched with development of corresponding computer information technologies at the same time, have the characteristics of good compatibility with other encryption methods, high automation degree, simple key, high password cracking difficulty, safer information transmission and the like, has good application values, and can provide better reference for other new encryption systems at the same time.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Cloud storage data confidentiality protection method

The invention discloses a cloud storage data confidentiality protection method. The method comprises: partitioning the data file to be uploaded to the cloud storage server by adopting the following method; then, obtaining a plurality of data blocks through scrambling and sequential recombination; dividing each data block into sub-data blocks; dividing the sub-data blocks into two parts; encryptingeach part by adopting different encryption algorithms; recombining the obtained ciphertext data blocks to obtain a ciphertext data file; uploading the data to a cloud storage server for storage; whendata needs to be used, the data can be used, downloading the ciphertext data file from the cloud storage server, dividing the ciphertext data file according to the inverse process of ciphertext datablock recombination during uploading, decrypting different parts by adopting different decryption algorithms, and recombining the decrypted data blocks according to the inverse process of data block recombination during uploading to recover the data file. According to the method, data block recombination and cross encryption are adopted, so that the security of storing the user data on the cloud storage server is improved.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

OFDM communication signal physical layer encryption method and device

The invention belongs to the technical field of communication security, and particularly relates to an OFDM communication signal physical layer encryption method and device, and the method comprises the steps: carrying out the symbol-by-symbol switching of a chaotic phase sequence initial value through a communication signal transmitting end secret key generation module; generating a dynamic composite chaotic sequence by combining the improved Logistic chaotic mapping and the Chebyshev chaotic mapping, and performing nonlinear disturbance on the composite chaotic sequence to obtain a chaotic sequence for encryption; and mapping the chaotic sequence to an OFDM rotation phase vector to complete physical layer encryption. According to the invention, symbol-by-symbol switching of chaotic sequence initial values is carried out; then, generating a composite chaotic sequence by combining the improved Logistic chaotic mapping and the Chebyshev chaotic mapping; the sequence randomness is improved through nonlinear disturbance, the initial value sensitivity of chaotic mapping is fully utilized, the decoding difficulty is further increased, compared with a traditional chaotic phase encryptionscheme, the operand is greatly reduced, the communication safety performance is greatly enhanced while the encryption chaotic performance is improved, and good application value is achieved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

DNA chip based cipher system

The invention provides a DNA chip based cipher system. The DNA of the DNA chip of the cipher system is a random sequence G (i, j). Oligonucleotide probes S (i, j) are oligonucleotide fragments obtained through artificially synthesizing the reverse complement sequences of a small-segment DNA sequence randomly intercepted from the random DNA sequence G (i, j) corresponding to the lattices of the DNA chip, and the uniqueness of the small-segment DNA sequence in the DNA chip is determined through using BLAST. Information encryption is that a DNA chip lattice distribution map M is marked with different G (i, j) to represent plaintext information, and then the oligonucleotide probes S (i, j) corresponding to the G (i, j) are mixed; and information decryption is that the oligonucleotide probes S (i, j) are hybridized with the random sequence DNA sequence. The encryption of same plaintext information can be realized through a large amount of different S (i, j) probe mixture combinations and can be admixed with any unlabeled DNA at will. The S (i, j) probes are composed of the random DNA sequence, and plaintext information related information is not coded in the DNA sequences of the mixtures of the S (i, j) probes, so the system cannot be decoded.
Owner:SOUTH CHINA BOTANICAL GARDEN CHINESE ACADEMY OF SCI

Encryption and decryption method and device based on zipper type dynamic hash and NLFSR

An encryption and decryption method based on zipper type dynamic hashes and NLFSRs comprises the following steps that a nonlinear feedback function and a bit transformation Boolean function are used for preprocessing a seed secret key to form a secret key stream sequence; changing the bit value of the plaintext sequence according to the bit transformation Boolean function based on the key stream sequence to form a pseudo plaintext sequence; dividing the pseudo-plaintext sequence into a plurality of paths of pseudo-plaintext subsequences according to the key stream sequence; and calculating a dynamic hash address corresponding to the binary bit of each pseudo plaintext sequence according to a hash mapping rule depending on the key stream sequence, and mapping the pseudo plaintext subsequence hashes which are divided into multiple paths into a ciphertext space to form the ciphertext stream sequence. The method has the beneficial effects that the key stream generator not only uses a nonlinear feedback shift register, but also introduces a bit transformation Boolean function, so that the key stream with longer period and better randomness is obtained; and through a plaintext bit transformation rule and a zipper type dynamic hash mapping rule, the decoding difficulty of the ciphertext stream sequence is improved.
Owner:ZHUHAI COLLEGE OF JILIN UNIV +1

A method and apparatus for encrypting data stored in a disk array

A method and apparatus for encrypting data stored in a disk array belong to the field of storage encryption technology. The encryption method comprises the steps of receiving data frames sent from a server, analyzing the data frames, and obtaining at least one group of data to be stored in a disk array; for each set of data to be stored in the disk array, obtaining a disk array number, a LUN identification and an LBA corresponding to the data; determining adjustment values corresponding to data according to disk array numbers, LUN identification and the first two or all of LBA; obtaining theencryption key corresponding to the LUN identifier, adjusting the encryption key by the adjustment value, encrypting the data by the adjusted encryption key, and storing the encrypted ciphertext datain the disk array. The application enables each group of data stored in the LBA to have a unique encryption key, thereby increasing the difficulty of deciphering the ciphertext data and ensuring the security of the ciphertext data in the disk array.
Owner:WUXI ALEADER INTELLIGENT TECH

Signal generator capable of flexiblely modulating in segmentable mode

The invention provides a signal generator capable of flexiblely modulating in a segmentable mode. The signal generator comprises an input module used for receiving carrier wave configuration information and modulated wave configuration information input by a user; wherein the modulated wave configuration information comprises modulated wave configuration queues and corresponding time intervals; a queue mapping module used for transiting the modulated wave configuration queues to modulated wave control word queues; a modulation module used for storing the modulated wave control word queues, and taking each queue element in the modulated wave control word queues according to the time intervals, and generating multiple groups of regulate control parameters according to the carrier wave configuration information and each queue element; and a carrier wave DDS module used for generating multi-segment modulating signals according to the multiple groups of regulate control parameters and the carrier wave configuration information. The signal generator can realize the segmented regulation function of variable frequency, phase or amplitude of modulated signals, complexity of the generated modulated signal is high, and the modulated signal is difficultly intercepted and decoded, and is suitable for practical application occasions such as modulation-demodulation experiments.
Owner:SUZHOU RIGOL PRECISION ELECTRIC TECH

Lightweight cryptographic algorithm SCENERY implementation method and device and storage medium

The invention discloses a lightweight cryptographic algorithm SCENERY implementation method, a lightweight cryptographic algorithm SCENERY implementation device and a storage medium. The method comprises the steps that a plaintext to be encrypted is acquired, IP1 initial replacement, a round function, key expansion and IP2 replacement are carried out in sequence, the round function comprises sequentially carrying out round key addition operation, S box replacement and M matrix replacement on data, and the key expansion comprises sequentially carrying out S box replacement, cyclic left shift, round constant addition operation and DP dynamic replacement on a key. An F function of an SPN structure is adopted as a round function, and a binary matrix M is constructed with the purpose of achieving high dependence when an F function linear layer is designed; a round constant and a key expansion intermediate result are selected as control signals for key expansion; DP dynamic replacement is carried out on a current round key expansion intermediate result to obtain a round key, which is a new key expansion mode, the relevance of single key iteration to front wheel input is reduced, the decoding difficulty is increased, the security is improved, and differential and linear attacks and algebraic attacks can be particularly and effectively resisted.
Owner:HENGYANG NORMAL UNIV

Power distribution automation information encryption method based on quantum reinforcement

The invention discloses a distribution automation information encryption method based on quantum reinforcement, and the method comprises the steps: presetting a key pool A in a master station and all terminals, independently setting a key pool B in the master station, pre-storing a key in the key pool A, pre-storing or storing a newly added key in the key pool B, and storing the newly added key in the key pool B, wherein the keys are quantum keys converted after quantum random numbers are generated by a quantum random number generator; distributing key packets: the terminals communicate with the master station, the terminals and the master station jointly select a key a from the key pool A, the master station extracts part of keys from the key pool B to form a key packet, and the key packet is encrypted by using the key a and sent to all the terminals; the terminal decrypting the received key packet by using the key a, extracting the key in the key packet for performing secondary encryption and decryption on the state grid encrypted message, and marking the key in the key packet after being used; and after all the keys of the key packet in the terminal are marked, a key a being selected from the key pool A again, and key packet distribution being performed again.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO LTD HANGZHOU POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products