Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32 results about "Cipher" patented technology

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is encipherment. To encipher or encode is to convert information into cipher or code. In common parlance, "cipher" is synonymous with "code", as they are both a set of steps that encrypt a message; however, the concepts are distinct in cryptography, especially classical cryptography.

Mobile payment method for field shopping

InactiveCN103854173ASolve the problem of being easily stolenEliminate human input errorsProtocol authorisationThe InternetComputer science
The invention relates to a mobile payment method for field shopping, and belongs to the technical field of mobile payment. A cellphone is utilized as a payment terminal of a consumer and a non-contact POS (point-of-sale) terminal of a commercial tenant. The mobile payment method comprises the steps that a commercial tenant cashier utilizes the cellphone to recognize a bar code of a commodity chosen by a consumer, and then a trading two-dimension code generated according to order information and business information is displayed on a cellphone screen; the consumer utilizes the cellphone to recognize trading two-dimension code information, and requests an internet payment platform and a bank deal system to pay after affirming the amount of payment. The mobile payment method provided by the invention has the advantages that a bank card and a POS machine are needed in the whole trading process, and the information of a bank card and account codes of the customer do not enter a commercial tenant cashier system, so that the operating cost of the commercial tenant is reduced, and the safety of mobile online payment is also guaranteed; a mobile payment system can record consumer consuming behavior data and commercial tenant market data which are generated in the trading process, and thus data resources with huge economic values and social values are accumulated for banks or Union Pay.
Owner:UNISPLENDOUR CO LTD +2

CDMA port-to-port encryption communication system and key distribution method thereof

InactiveCN101635924AImprove securityReduce security risksSecurity arrangementCommunications securityCommunications system
The invention discloses a CDMA port-to-port encryption communication system and a key distribution method thereof, the CDMA port-to-port encryption communication system comprises a CDMA network and a terminal mobile telephone thereof, a public switched telephone network and a terminal fixed-line telephone thereof, a short message service center as well as the following three cipher processing units including a cipher chip of a mobile telephone terminal, a key distribution management center (KDMC) and a Firmware cipher module of a gateway mobile switching center. The key distribution management center is used for key distribution management of the communication system. The key distribution is realized by a layered distribution method, i.e. a first layer is an equipment key which is distributed in the process of initialization; a second layer is a key-encryption key and a short message service key which are distributed in startup of an enciphered mobile telephone; and a third layer is a session key which is distributed every time a session is launched between the enciphered mobile telephones. At the same time, by adopting a bidirectional certification technology for key distribution and combination of a key update and remote destroying method, the safety risk in key exposure is reduced, and the communication safety is improved.
Owner:CETC CYBERSPACE SECURITY TECH CO LTD

Non-key gate control system

InactiveCN101343961AExtended service lifeImprove securityElectric permutation locksMicrocontrollerSystem controller
The invention relates to a keyless gate controlling system. The keyless gate controlling system comprises a keyless system controller utilizing the cipher mode of mutual identification verification, a carrying card, and a receiving and transmitting antenna, the keyless system controller positioned at a car body end comprises a low frequency transmitting circuit connected with a singlechip and a high frequency receiving circuit; the carrying card adopts an identification verification card which comprises a low frequency receiving circuit connected with a microprocessor and a high frequency transmitting circuit; by adopting the keyless gate controlling system, the problem that the great inconvenience brought to users due to the car door opening mode through directly using a key or a remote controller is solved.
Owner:SHANGHAI SICAR VEHICLE TECH DEV

User logging-in method under system control

The invention provides a user logging-in method under system control. The method comprises: a user logs in a system; the system determines whether the logging in is realized by means of manual inputting or USB Key; if the logging in is realized by using a USB Key, the information in the USB Key is read by the system and the user inputs card number and password information, so that the user can log in the system without being limited by an IP and an Mac address; and after USB Key acknowledge, the system sends a random short-message verification code to the user, the user inputs the verification code and can not log in the system until the verification code is correct, and the system checks the correctness of the verification code and thus the logging in is done successfully. And if the logging in is realized by the manual logging in way, the user inputs a user name and a password; after the information is checked to be correct, the system sends a random short-message verification code to the user; the user inputs the verification code and can not log in the system until the verification code is correct, and the system checks the correctness of the verification code and thus the logging in is done successfully. Compared with the prior art, the method has advantages of high practicability, security and flexibility.
Owner:安徽天达网络科技有限公司

File encryption operation method and file encryption operation system

The invention discloses a file encryption operation method and a file encryption operation system. The method comprises the steps of: receiving a file operation instruction; transferring an encrypted target file according to the file operation instruction; carrying out memory decryption on the encrypted target file according to key information corresponding to the encrypted target file, and operating the encrypted target file after memory decryption. According to the scheme disclosed by the invention, the password of the encrypted target file does not need to be manually input; opening and operating of the file can be achieved by decrypting the file without a manual operation, and the operating efficiency of the key information is improved. On the other hand, the encrypted target file is decrypted by the key information in the memory; the decrypted file is stored in the memory, and a permanent file is not generated, therefore, the password is not stolen by the others, and the operating security of the encrypted file is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Two-dimensional code transmitting and activation method and system

ActiveCN105761090AImprove protectionSecure coding dynamic managementCommerceActivation methodComputer hardware
A two-dimensional code transmitting and activation method and system are disclosed. An enterprise server in the two-dimensional code transmitting method transmits a code transmitting request including but not limited to a device number, an enterprise code, a register account and a login password to a cloud platform through a dedicated code transmitting channel in the production process; the cloud platform receives the code transmitting request, and determines whether the enterprise code, register account and login password are consistent with the enterprise code, register account and login password that are allocated to an enterprise by the cloud platform and whether the device number is associated with the dedicated code transmitting channel; if so, the cloud platform receives the code transmitting request and encrypts an original code to generate and transmit a cloud code with an irregular character sequence to the enterprise server; and the enterprise server receives the cloud code, generates a two-dimensional code adhered to the outer layer of a commodity through a two-dimensional code generating algorithm, and in this way, a secure and reliable code dynamic management Internet code transmitting solution can be provided to the production enterprise.
Owner:深圳中检网络传媒有限公司

Lock It!

InactiveUS20160051084A1Easy to operateMaintaining food moistureCooking-vessel materialsClosuresPlastic materialsFood storage
A food storage container comprising a bottom container for storing food, an easy to lift ventilation cover and a locking lid for securing the contents of the food storage container. The locking lid is provided at the top portion thereof with a combination lock. The combination lock having a plurality of wheels and notches being aligned with numbers on a rotatable dial. The combination lock is provided with lock bolts and engageable locking cases on both sides preventing the food storage container from opening. The food storage container is preferably formed from dishwasher-safe and microwave-safe materials. The combination lock of the present invention can be formed from a metal, glass or plastic material.
Owner:MARTINEZ SHAINA

Protection device used for bank hardware code

InactiveCN104301118ASolve technical problems of potential safety hazardsPrevent leakageMultiple keys/algorithms usageUser identity/authority verificationCipher
The invention discloses a protection device used for a bank hardware code. The protection device comprises three layers of code protection modules, the code protection module on the first layer is used for setting a mark secrete key, the code protection module on the second layer is used for encrypting or decrypting a work secrete key, the code protection module on the third layer is used for setting a data secrete key, and the mark secrete key is used for encrypting the code protection module on the second layer, generating a signature and verifying the signature. The code protection module on the third layer is a secrete key used for encrypting data in the work secrete key and used for encrypting sensitive data, wherein encryption operations of the sensitive data include the steps that the sensitive data undergo desensitization processing, whether the desensitized data meet predefined desensitization requirements is judged, and the hardware code is stored when the desensitized data meet the predefined desensitization requirements. The protection device has the advantages that sensitive information in banks is prevented from being let out and safety is guaranteed.
Owner:CHENGDU SHUANGAOYANG TECH

Intelligent door lock system capable of automatically judging abnormal state of door lock

The invention provides an intelligent door lock system capable of automatically judging the abnormal state of a door lock. The intelligent door lock system comprises a central control unit, an electronic lock, a camera, a door magnetic sensor, a mobile terminal and a management platform, wherein the management platform displays the geographic positions of all intelligent door locks through an electronic map and binds the mobile terminal and the electronic lock, and the mobile terminal can only unlock the electronic lock bound to the mobile terminal. The central control unit controls and sensesthe states of the electronic lock, the camera and the door magnetic sensor, automatically judges the abnormal state of the door lock and gives an alarm. The combined shift time asynchronous algorithmdisclosed by the invention is simple in engineering realization and high in encryption performance, is different from a traditional encryption algorithm which has more password attack modes, and is relatively safer and more reliable. The intelligent door lock system which is simpler and easier to use, clear in responsibility, capable of sensing and judging the abnormal state in real time and capable of achieving post-event tracing is provided for a user, and warning and deterrence can be formed for an actor who intends to destroy a box body while the user can use the system conveniently.
Owner:NANJING LES CYBERSECURITY & INFORMATION TECH RES INST CO LTD

Key management method and system supporting multiple key systems

The invention provides a secret key management method and system supporting multiple secret key systems, and the method comprises an initialization process: randomly generating a root main secret keythrough password equipment, and enabling a root main secret key threshold to be backed up to all root main secret key mother cards; generating a first-level public and private key through the passwordequipment, and generating a first-level certificate through self-signature; generating a root identification key through the cryptographic device; the symmetric key management comprises the followingsteps: dispersing a root master key to obtain a primary symmetric key; sequentially dispersing upper-level symmetric keys to obtain second-level to N-level symmetric keys; dispersing N levels of symmetric keys to obtain a user symmetric key; the asymmetric key management comprises the following steps: sequentially generating second-level to N-level public and private keys and user public and private keys through password equipment; sequentially generating second-level to N-level certificates and user certificates through signing and issuing of an upper-level private key; identification key management includes generating a user key by calculating parameter information including a user identifier and a root identifier key.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Mobile phone hotspot controlled keyhole-free safety box

InactiveCN110056285AStop theftNon-mechanical controlsIndividual entry/exit registersElectromagnetic lockPassword
The invention discloses a mobile phone hotspot controlled keyhole-free safety box, and relates to the technical field of safety boxes. The mobile phone hotspot controlled keyhole-free safety box comprises a cabinet body, an upper cover, a safety box door and a grid division top plate, wherein the bottom of the upper cover is fixedly connected with the top of the cabinet body, the safety box door is movably arranged on the front side of the cabinet body, an electromagnetic bolt is fixedly arranged at the bottom of the inner surface of the safety box door, the interior of the cabinet body is fixedly provided with adjustable screw rod assemblies which are symmetrically arranged, and the grid division top plate is in sliding connection with the adjustable screw rod assemblies. According to themobile phone hotspot controlled keyhole-free safety box, a keyhole-free design is adopted, so that thief unlocking technology is nowhere to be used, an electromagnetic lock is opened by utilizing a hotspot of a mobile phone, so that the purpose of opening the electromagnetic lock by cracking a wireless WIFI password by a thief can be prevented, a wireless hotspot module is used for matching the hotspot on the mobile phone with the wireless hotspot module, so that a theft of the thief by utilizing the wireless signals is avoided.
Owner:路越

A method and device for improving data card security

The embodiment of the invention discloses a method and a device for improving the security of a data card, which relate to the field of information security and are invented for improving the security of information in the data card. The method includes: binding the data card inserted into the first terminal with the first terminal; generating a decryption password; when the data card needs to be read and written, determining that the data card needs to be read and written Whether the second terminal is the first terminal, and if so, use the decryption password to decrypt the data card. The embodiments of the present invention are mainly used in various data cards.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Unlicensed vehicle recognition system

InactiveCN106327853ANon-electrical signal transmission systemsRoad vehicles traffic controlIn vehicleRemote control command
The invention relates to an unlicensed vehicle recognition system. An inspector holding a remote controller (103) presses different buttons to send different remote control instructions which are transmitted to a vehicular controller (102) in a wireless or infrared manner; the vehicular controller (102) controls a plurality of top lights (101) in different colors to flicker according to different color sequences or controls the top lights (101) in different colors to be lighten according to different combinations; the vehicular controller (102) controls a speaker (104) to give out different voices or melodies; if no display or sound is detected, the lights in different colors are not right in display sequence or display combination, or the sound or the melodies are not right, an inspected vehicle is possibly an unlicensed vehicle. The inspector holding the remote controller (103) presses different buttons, the vehicular controller (102) receives the remote control instructions and replies a string of code data through wireless or infrared signals, and various existing encryption algorithms can be adopted for encryption; if no code data is replied or the replied code data are not right, the inspected vehicle is possibly an unlicensed vehicle.
Owner:HANGZHOU HOPECHART

Method for defensing zero power consumption attack on code device

ActiveCN103001762AGood resistance to zero power consumption attack performanceReasonable speedEncryption apparatus with shift registers/memoriesMultiplexingCoprocessor
The invention discloses a method for defensing zero power consumption attack on a code device. The method is characterized in that inverse operation on a GF (28) finite field in a byte replacing module is replaced with GF (28) field additivity shielding inverse operation. The specific process is that inverse operation is first conducted on the GF (28) finite field, then the GF (28) field additivity shielding inverse operation is conducted, and a simpler GF (256) field additivity shielding inverse algorithm is provided by adopting a key module multiplexing method on the base that the traditional improved advanced encryption standard is analyzed. The method has the advantages of maintaining good zero power consumption attack resistance, being reasonable in area expense and circuit speed and capable of being widely applied to coprocessors and fields with high requirements for area, speed and security.
Owner:NINGBO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products