Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "Encryption" patented technology

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can be read only if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.

Efficient, Secure, Cloud-Based Identity Services

InactiveUS20110246765A1Improve securityUser identity/authority verificationWeb serviceSecurity Measure
An Identity Ecosystem Cloud (IEC) provides global, scalable, cloud-based, cryptographic identity services as an identity assurance mechanism for other services, such as data storage, web services, and electronic commerce engines. The IEC complements these other services by providing enhanced identity protection and authentication. An IEC performs identity services using surrogate digital certificates having encryption keys that are never exposed to the public. An individual requesting other services must meet an identity challenge before access to these other services is granted. Service requests to the IEC, and responses from the IEC, are securely encrypted. An IEC integrates smoothly into existing services by layering on top of, or being used in conjunction with, existing security measures. Identity transactions may be logged in a manner that complies with strict medical and financial privacy laws.
Owner:SURIDX

Digital certificate safety lock device and digital certificate authentication system and method

InactiveCN102255730AImprove general performanceImprove applicabilityUser identity/authority verificationMicrocontrollerTablet computer
The invention relates to a digital certificate safety lock device and a digital certificate authentication system and method. The digital certificate safety lock device comprises a universal encryption and digital signature microcontroller, an audio plug and a first modulation and demodulation module, wherein the universal encryption and digital signature microcontroller is provided with an encryption and digital signature module and a storage for storing a digital certificate, a key of the digital certificate and encryption and decryption algorithms; and the first modulation and demodulation module is used for modulating data information from the encryption and digital signature module for transmitting through an MIC (Microphone) pole of the audio plug, demodulating a signal received from a first sound channel pole of the audio plug and transmitting the demodulated signal to the encryption and digital signature module. The digital certificate safety lock device is provided with a universal audio interface plug which has high university and adaptability and can support communication terminals such as mobile phones, tablet computers, PDAs (Personal Digital Assistants) or PCs (Personal Computers) and the like, with audio interfaces. Due to the functions of independent hardware signature, digital certificate encryption and the like, the security of application logon and transactions of Internet banks or enterprises can be ensured to the maximum extent.
Owner:吴沙林 +1

Network communication encrypting method and system

The invention discloses a network communication encrypting method and a system. The network communication encrypting method includes that a first communication party sends an encryption negotiation request to a second communication party to start encryption negotiation; the first communication party and the second communication party generate initial symmetrical secret keys respectively by means of a dissymmetrical encryption interactive mode to achieve encryption negotiation; the first communication party encrypts a data packet by using the initial symmetrical secret keys to obtain an encrypted data packet and updates the initial symmetrical secret keys by using a predetermined algorithm, and the updated initial symmetrical secret keys are used as symmetrical secret keys for next encryption; and the second communication party decrypts the encrypted data packet by using the initial symmetrical secret keys and updates the initial symmetrical secret keys by using the same predetermined algorithm, and the updated initial symmetrical secret keys are used as symmetrical secret keys for next decryption. According to the network communication encrypting method and the system, safety of information is guaranteed, simultaneously, the work amount of encryption and decryption of communication parties is reduced, and efficiencies of encryption and decryption and communication performances are improved.
Owner:BEIJING FEINNO COMM TECH

TDD Uplink and Downlink Configuration Updating Method and Apparatus and TDD Re-Configuration Information Notification Method and Apparatus

InactiveUS20150208382A1Avoid delayAvoid resourcesTime-division multiplexRadio transmissionComputer hardwareEncryption
A method for encrypting a terminal with a subscriber identity card includes: a terminal storing the unique identity number of a subscriber identity card; the terminal detecting an operation of a user and authenticating a current user according to authentication conditions set by the user. Authenticating the current subscriber refers to that the terminal reads the unique identity number of the current subscriber identity card, and compares the read unique identity number of current subscriber identity card with the stored unique identity number of subscriber identity card; if they are the same, the terminal is controlled to enter a normal working state; and if they are different, the terminal locks by itself or disables the access of current user. The present document encrypts a mobile terminal with a subscriber identity card, so as to make the encryption technique of the terminal more secure and reliable, and improve the user experience.
Owner:ZTE CORP

Image encryption for print-and-scan channels using pixel position permutation

An image encryption method that includes receiving image data based on an image, wherein the image data comprises a plurality of pixel values, and permuting a plurality of, and preferably all of, the pixel values using at least a secret key to create permuted image data. Also, an image decryption method that includes scanning a printed image to create scanned image data. The printed image is generated from permuted image data that is generated by permuting a plurality of first pixel values of first image data using at least a secret key, obtaining a plurality of second pixel values from the scanned image data, and reverse-permuting a plurality of the second pixel values using at least the secret key to create reverse-permuted scanned image data.
Owner:PITNEY BOWES INC

Information processing method, device and equipment and readable storage medium

ActiveCN111178884AAvoid direct contactImplement usage managementFinancePayment protocolsInformation processingTransaction data
The invention belongs to the technical field of security mechanisms, and provides an information processing method, device and equipment and a readable storage medium, and the method comprises the steps of building the connection with a business system when a connection request of the business system is received, and maintaining the connection state with the business system; creating account information corresponding to the service system, returning the created account information to the service system, and the account information at least comprises an encryption private key; when transactioninformation sent by a service system is received, extracting an encrypted private key from account information carried by the transaction information, and decrypting the extracted encrypted private key to obtain a private key; and signing the transaction data carried by the transaction information by using the decrypted private key, and returning the signed transaction data to the business system,so that the business system performs transaction with an external system according to the signed transaction data. According to the invention, the security of the private key of the service system can be ensured, so that the security of private information and assets of the service system is ensured.
Owner:PINGAN YIQIANBAO E COMMERCE CO LTD

Network connection method, network connection device and terminal

ActiveCN106131834AImprove user security experienceImprove securitySecurity arrangementPasswordNetwork connection
The invention provides a network connection method, a network connection device and a terminal. The network connection method comprises the steps of judging whether the SSID (Service Set Identifier), BSSID (Basic Service Set Identifier) and connection password of the wireless network access point are correspondingly stored in a preset safe network list or not when a wireless network access point is scanned; obtaining preset authentication information corresponding to the wireless network access point when the judging result is yes, encrypting the preset authentication information through a preset encryption key and sending the encrypted preset authentication information to the wireless network access point; detecting whether the response information of the wireless network access point for the encrypted preset authentication information is received or not; and determining whether to establish connection with the wireless network access point by employing the connection key or not according to the response information when it is detected that the response information is received. According to the technical scheme, the security of automatic connection with a wireless network can be effectively improved, the connection with phishing is avoided, the information security of the user is ensured, and the use safety experience of the user is improved.
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD

Simultaneous digital image and the image file's internal metadata printing system

InactiveUS20150070733A1Visual presentationDigital output to print unitsTablet computerX-ray
A system that simultaneously prints digital image files' images and image files' internal metadata. The details for a digital image may be printed onto the front side and / or back side of a picture's printed hardcopy while simultaneously printing the digital image file's internal metadata or simultaneously displaying the digital image with its file's internal metadata on electronic media such as televisions, desktop, laptop and tablet computer screens, digital picture frames, cell phone, smart phone and telephone displays, public billboards, Internet web pages and x-ray photographs. The digital picture's details, being presented in the subject system as a file's internal metadata, include but are not limited to the picture's file name, the photographer's name, a copyright holder's name and a description of the picture, as well as the picture's technical details such as its image format, date, GPS location, focusing mode, metering mode, shutter speed, flash exposure compensation, resolution, ISO sensitivity, white balance, etc. A unique image identification code, password protection and encryption, can be assigned to each image and incorporated in the image file's internal metadata.
Owner:BERNARDO JOSEPH A

Content copyright protection method based on original video data transformation encryption

PendingCN111988640ASelective content distributionData transformationAlgorithm
The invention discloses a content copyright protection method based on original video data transformation encryption, and the method specifically comprises the steps: carrying out the encryption of geometric structure transformation of original video data contained in a to-be-played file, and generating geometric transformation encryption algorithm description information embedded in the to-be-played file; obtaining a playing address which is sent by a user and corresponds to the to-be-played file; performing validity verification on a player called by the client through a DRM plug-in, and driving the DRM plug-in to obtain a to-be-played file corresponding to the playing address when the verification is passed; and based on the geometric transformation encryption algorithm description information carried by the to-be-played file, performing geometric structure restoration decryption on the to-be-played file through a geometric transformation decryption plug-in carried by the client, and playing the decrypted to-be-played file on the called player. According to the embodiment of the invention, the original video stream of the to-be-played file is subjected to encryption and decryption processing of geometric structure transformation, so that the security of video file propagation is improved.
Owner:UNITEND TECH +1

Cross-platform information source speech encryption method and cross-platform information source speech encryption device

The invention provides a cross-platform information source speech encryption method and a cross-platform information source speech encryption device. The cross-platform information source speech encryption method comprises steps that a mobile terminal of a transmitting party is used to acquire and process transformed standard PCM data, and is used for the sound effect processing, the routing processing, and the encryption processing of the standard PCM data sequentially to generate encrypted code flow data; the coding modulation of the encrypted code flow data is carried out, and after carriermodulation, the mobile terminal is used to transmit the code flow data after the coding modulation to a base station; by adopting the base station and a core network, the code flow data is transmitted to a mobile terminal of a receiving party; the mobile terminal of the receiving party is used to receive the code flow data, and the decoding modulation, the decryption, the mixing, and the routingprocessing of the code flow data are sequentially carried out, and a correct channel is selected to transmit the code flow data, and downlink gain is adjusted, and then the code flow data is played after gain optimization. A problem of strong dependence of conversation encryption on a hardware platform is well solved, and the provided encryption method has higher safety performance, and project design adopts a modularization concept.
Owner:DATANG TERMINAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products