Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

61results about "Key distribution for secure communication" patented technology

Communication System And Communication Device

InactiveUS20080020707A1Easy to identifyReduce riskKey distribution for secure communicationMultiple keys/algorithms usageComputer hardwareCommunications system
A communication apparatus capable of easily identifying a communication partner and securely sharing a session key between the communication apparatus and the communication partner even if the communication apparatus has a processing power that is not so high includes a short-range active communication unit 101 transmitting an inquiry signal to a short-range external communication apparatus by electromagnetic waves and waiting for a response to the inquiry signal; a long-range communication unit 104 capable of communication by the electromagnetic waves in a range wider than the communication area of the short-range active communication means; a switching unit 111 switching to either the short-range active communication unit or the long-range communication unit; and an asymmetric key generator 102 generating a pair of an encryption key and a decryption key corresponding to the encryption key. The communication apparatus is characterized by using the decryption key to decrypt an encrypted session key transmitted from the external communication apparatus and transmitting to the external communication apparatus a communication switching request signal to request the switching to the long-range communication unit and communication by using the long-range communication unit.
Owner:SONY CORP

Key distribution and authentication methods, devices and systems

ActiveCN107317789AReduce the burden onSolve the problem that it cannot be applied to smart devices that do not support USIM cardsKey distribution for secure communicationSecurity arrangementSecure communicationWeb authentication
Embodiments of the invention provide key distribution and authentication methods, devices and systems. The methods comprise the following steps that a business center server receives a first key request message sent by a user management server, generates a first-layer key of the user management server according to the first key request message and sends the first-layer key to the user management server; and the user management server generates a second-layer key of a terminal device according to the first-layer key and sends the second-layer key of the terminal device to the terminal device in order to make the terminal device and a network authentication server carry out mutual authentication according to the second-layer key. The business center server and the user management server distribute the different keys to each terminal device, each terminal device carries out mutual authentication with the network authentication center based on the respective key, and a communication key of the terminal device and a function network element is finally obtained, a method for establishing a safety communication channel is provided for the terminal device, and the application range is wide.
Owner:HUAWEI TECH CO LTD

Transformer substation quantum communication model, quantum secret key distribution center and model achieving method

ActiveCN102983965AImprove securityImprove reliabilityKey distribution for secure communicationKey distribution centerQuantum key distribution
The invention relates to a transformer substation quantum communication model, a quantum secret key distribution center based on the model and a model achieving method. The communication model is a quantum secret key distribution system and comprises a quantum secret key distribution (QKD) optical device, a secret key obtaining module and a secret key control module. The secret key control module, the secret key obtaining module and the QKD optical device are connected in sequence. The quantum secret key distribution center comprises two levels. A primary quantum secret key distribution center (QKDC) is configured in a control center, and a second QKDC is configured at the controller end of a transformer substation. By defining a password suite compatible with secret key distribution protocol and designing a secret key distribution method, the safety and the efficiency of secret key distribution are improved, safe transmission of data is strengthened, and stability and safety of a power system network in operation are guaranteed.
Owner:CHINA ELECTRIC POWER RES INST +2

Quantum key distribution system and method based on quantum true random numbers

InactiveCN106209363ARemove true random number barriersSolve puzzles without the use of true random numbersKey distribution for secure communicationComputer moduleKey distribution
The invention discloses a quantum key distribution system based on quantum true random numbers. A quantum state measurement module is used for measuring quantum states of quantum light sources received from quantum channels by employing random numbers generated by a receiving end and the frequency same to that of a sending end quantum light source; a receiving end master control module is also used for numbering each time of measurement of the quantum state measurement module; a postprocessing module is used for carrying out basic information comparison on measurement results through classical channels according to a BB84 protocol; and the postprocessing module also is used for partially disclosing a key after the basic information comparison, estimates a bit error rate of this time of communication and carries out correction and secret keeping amplification processing on the surplus key, thereby enabling a transmitting end master control module and the receiving end master control module to generate and output the same safety key. The invention also discloses a quantum key distribution method based on the quantum true random numbers. According to the system, the difficult problem that the true random numbers are not employed in an existing high-speed quantum key distribution system is solved, and the true random number barrier of the quantum key distribution system with the higher speed in the future is removed.
Owner:ANHUI QASKY QUANTUM SCI & TECH CO LTD

Verification method for providing information verification for enterprise information server

ActiveCN106603225APrevent tamperingImprove anti-counterfeiting performanceKey distribution for secure communicationPublic key for secure communicationDomain nameValidation methods
The invention discloses a verification method for providing information verification for an enterprise information server. The verification method comprises the following steps: S1, spontaneously generating an asymmetrical key by an enterprise, and specifying a key name; S2, storing a private key in the enterprise, and storing a public key in a resource record of a domain name; S3, capturing an article event by the enterprise information server, computing an abstract of event information, and using a private key signature; S4, submitting the event information, a signature value, and the key name of the article event to a directory server (DS); S5, acquiring, by a client, a directory record of the article event from the directory server (DS), and querying the key name through a DNS (Domain Name Server) so as to obtain the public key; and S6, decrypting the signature value of the directory record by using the public key to obtain an original abstract value of the event information, accessing corresponding event information, computing an abstract value of the event information, determining whether the original abstract value and the computed abstract value are same or not through comparison, and if the original abstract value and the computed abstract value are same, passing the information verification. The verification method disclosed by the invention ensures that articles cannot be abused under an internet-of-things tag, and circulation information of the articles cannot be tampered.
Owner:JMIT CO LTD

Dynamic generation method for access key of automobile electronic information card

InactiveCN102833072AAchieving dynamismImprove read and write speedKey distribution for secure communicationUser identity/authority verificationData centerStructure of Management Information
The invention discloses a dynamic generation method for an access key of an automobile electronic information card. The automobile electronic information card comprises a Reserved data storage area, an EPC (electronic product code) data storage area, a TID (terminal identification) storage area and a USER storage area. Based on RFID (radio frequency identification) technology, initialization is realized, the access key and an EPC random code are generated dynamically, and access key updates are accessed. The method includes the steps: initializing the automobile electronic information card, dynamically generating the access key of the automobile electronic information card, and updating the access key. Compared with the prior art, the access key of the automobile electronic information card is simple in structure, scientific and reasonable in design and low in manufacturing cost, doesn't need to be stored in a reader, an acquisition device or a data center, and accordingly security of data in the automobile electronic information card is improved, read-write speed and efficiency of the reader are improved, dynamics of access key generation is achieved, and a safe and reliable dynamic generation system for the access key of the automobile electronic information card is provided.
Owner:天津广行科技有限公司

Authentication system and authentication method based on central node

PendingCN107135228AKey distribution for secure communicationAuthentication systemMulti point
The invention discloses an authentication system based on a central node. The authentication system comprises local verification and authentication units and a remote verification and authentication unit; each of the local verification and authentication units includes a local authentication device; the remote verification and authentication unit includes an authentication central device; the authentication central device and a plurality of the local authentication devices are further respectively connected with a key relay device; the local verification and authentication units are connected to corresponding external devices. The invention further discloses an authentication method based on the central node. Compared with the prior art, through local verification and authentication or remote verification and authentication, on the basis of communication of authentication centers for the local verification and authentication and the remote verification and authentication, the communication connection between the external devices and all devices connected with the authentication centers is implemented by the authentication system and the authentication method, the defect that the external devices only can perform authentication with a designated device is abandoned, and the convenience is provided for multi-point authentication and communication; and in addition, the multi-encrypted transmission of authentication information is implemented in an authentication process, and the security for transmitting the authentication information is guaranteed.
Owner:ZHEJIANG QUANTUM TECH CO LTD

Group message sending method and system, group message receiving method and system and communication terminal

The invention discloses a group message sending method and system, a group message receiving method and system and a communication terminal. The group message sending method comprises the steps of taking a time stamp, an interaction key and a key seed corresponding to a local group as input, carrying out operation through a preset key generation algorithm and generating a current message key; encrypting a current group message through utilization of the current message key and a preset symmetric encryption algorithm, thereby obtaining a ciphertext message; and sending the ciphertext message and the corresponding time stamp to other client modules in the local group through a group chat message platform. According to the methods, the systems and the communication terminal, the current message key can be updated in real time, so the risk that the current message key is broken can be effectively reduced. Even if other person obtains the preset key generation algorithm, data transmission is not carried out on the key seed along with the ciphertext message, so the other person is difficult to obtain the key seed, under the condition that the key seed cannot be obtained, the other personcannot obtain the current message key, and the ciphertext message cannot be decrypted.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Decentralized computing systems and methods for performing actions using stored private data

InactiveUS20220014367A1Key distribution for secure communicationPublic key for secure communicationEngineeringOne-time password
A distributed computing system is used to form a login network to perform an action for a user, using private data. The login network executes the verification using blockchain computing architecture, which is decentralized. The private data is stored on the blockchain in an obfuscated form. In order to compute the private data from the obfuscated form, multiple distributed private key shares are required to generate multiple decryption shares, which are combined to compute a One Time Pad (OTP). In turn, the OTP is used to obtain the private data from the obfuscated form.
Owner:LOGIN ID INC

Picture sharing method and system

ActiveCN109525559AEnsure safetyEnsure the efficiency of screen transmissionKey distribution for secure communicationEncryption apparatus with shift registers/memoriesComputer hardwareNetwork code
The invention discloses a picture sharing method and system. The picture sharing method comprises the following steps: a master device performs handshake with a slave device when receiving a picture sharing request initiated by the slave device; when the master device performs handshake with the slave device successfully, the master device performs network coding on a picture signal to be shared,outputs a TS bare stream signal to the slave device, and plays the picture to be shared; and the slave device receives and decodes the TS bare stream signal, and synchronously displays the current picture to be shared. Thus, the picture information of the master device can be displayed synchronously on other slave devices without delay and jamming; and a private protocol is used in network transmission, therefore, network security and picture transfer efficiency are ensured.
Owner:SHENZHEN SKYWORTH DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products