CN103986572B - Cryptographic system and its disposable random cipher generation method based on spatial variations and application - Google Patents
Cryptographic system and its disposable random cipher generation method based on spatial variations and application Download PDFInfo
- Publication number
- CN103986572B CN103986572B CN201410149122.7A CN201410149122A CN103986572B CN 103986572 B CN103986572 B CN 103986572B CN 201410149122 A CN201410149122 A CN 201410149122A CN 103986572 B CN103986572 B CN 103986572B
- Authority
- CN
- China
- Prior art keywords
- status information
- cryptographic
- feature
- feature status
- dynamic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Disposable random cipher generation method and application the invention discloses cryptographic system and its based on spatial variations, including cryptographic system, gather the dynamic-change information of mobile communication equipment and set feature status information matching degree, according to the matching degree dynamic lock-out state of selection setting, meet then lock-in feature status information and send user reminding information, the feature status information of locking is generated into specific cryptographic bitstream and is cached, the establishment of cryptographic bitstream includes using signature algorithm and hash algorithm, random cipher generation system is applied to set many Synchronizing Passwords confirmations of mobile communication equipment, many mobile communication equipments are simultaneously and synchronization is moved, consistent and synchronous cipher key is obtained using hash algorithm, transmitted by network system and verified.Through the above way, the characteristics of cryptographic system of the present invention and its disposable random cipher generation method based on spatial variations with application there is distinct device to produce disposable random cipher to be encrypted communication according to being synchronized with the movement.
Description
Technical field
The present invention relates to system encryption field, more particularly to cryptographic system and its disposable random based on spatial variations
Method for generating cipher code and application.
Background technology
Pass through the skills such as the Quick Response Code identification of wireless protocols or camera and display screen between general mobile communication equipment
Art interactive information, but there is be stolen information and the danger by assault, existing password encryption skill in communication process
Art is encrypted using the fixed password in effective time set in advance, or is added using operation method set in advance
Close, either fixed password or operation method set in advance are a kind of encryption mode set in advance, for example, in Liang Tai
Communicated between the equipment of encryption, a side is equipped with " spy " software, by the fixed password for obtaining or by advance
The operation method of setting produces key that the communication of pattern is fixed with the opposing party, then Content of Communication is stolen or the opposing party meets with
Under fire behavior, causes serious influence, or even the loss for producing information and property;
In the prior art, random and synchronization a disposable encrypting key cannot be produced between two equipment of encryption
Spoon, once be stolen fixed password or operation method set in advance, the opposing party be configured just be easy to shoot its " Gu
It is fixed constant " side, eavesdropped in its communication process and produced attack, and these behaviors can be continued until
The change of existing communication pattern.
The content of the invention
The present invention solves the technical problem of provide a kind of cryptographic system and its based on spatial variations it is disposable with
Secret code generating method and application, movement is synchronized by two or many mobile communication equipments, and collection mobile message is simultaneously
Setting out corresponding disposable synchronization key carries out two or many stochastic pattern synchronous crypto-operations and identification of mobile communication equipment
Protection.
In order to solve the above technical problems, primary and foremost purpose of the invention is to provide a kind of cryptographic system.
The disposable random of spatial variations is based on another object of the present invention is to provide a kind of above-mentioned cryptographic system application
Method for generating cipher code.
A further object of the present invention is to provide the disposable random cipher that a kind of above-mentioned cryptographic system is based on spatial variations
The application of generation method.
To achieve these goals, the present invention uses following technical scheme:Cryptographic system is based on the disposable of spatial variations
Random cipher generation method, comprises the following steps:
(1)The dynamic-change information of mobile communication equipment is gathered, dynamic feature information is isolated from dynamic-change information;
(2)Dynamic feature information is generated into feature status information according to pre-arranged code mode, is believed according to the significant condition
Breath searches feature set in advance with reference to database, determines the feature status information matching degree;
(3)According to the feature status information matching degree dynamic lock-out state of selection setting, the significant condition letter is met
Breath matching degree, goes to step(4), otherwise, go to step(1);
(4)Lock the feature status information and send user reminding information;
(5)The feature status information for locking is carried out into computing, coding, cryptographic bitstream is generated;
(6)Cryptographic bitstream stores and sends or receive to caching and simultaneously by transport module.
In a preferred embodiment of the present invention, step(1)The dynamic feature information is rate of acceleration change, angular speed
At least one in rate of change, change in displacement rate and geomagnetic fieldvector value and its rate of change.
In a preferred embodiment of the present invention, step(3)It is dynamic according to feature status information matching degree selection setting
State lock-out state is specifically included:The dynamic-change information being kept in motion according to communication equipment obtains corresponding significant condition letter
Breath matching degree, the feature status information, the feature status information are locked according to the feature status information matching degree automatically
Matching degree includes that rate of acceleration change, rate of change of angular, change in displacement rate and geomagnetic fieldvector value and its relevant parameter change
At least one matching in rate, the rate of change of geomagnetic fieldvector value includes eccentricity.
In a preferred embodiment of the present invention, step(5)The establishment of the cryptographic bitstream includes using signature algorithm
And Hash(HASH)At least one in algorithm.
A kind of application is based on the cryptographic system of the disposable random cipher generation method of spatial variations, including:
Acquisition module:Dynamic-change information for gathering mobile communication equipment, separates from dynamic-change information and sets out
State characteristic information;
Coding module:For dynamic feature information to be generated into feature status information according to pre-arranged code mode;
Matching module:For searching feature set in advance with reference to database according to the feature status information, institute is determined
Feature status information matching degree is stated, according to the feature status information matching degree dynamic lock-out state of selection setting;
Locking module:For locking the feature status information and sending user reminding information;
Output module:For using signature algorithm and Hash to the feature status information for locking(HASH)In algorithm
At least one algorithm sets AES and corresponding decipherment algorithm, and the feature status information is generated message in cipher by AES
Breath flows and caches;
Transport module:For cryptographic bitstream to be transmitted and be received by network system;
Authentication module:For the cryptographic bitstream in other cryptographic systems for receiving to be carried out with the cryptographic bitstream of itself
Contrast verification, cryptographic bitstream is identical, is decrypted using identical decipherment algorithm, and cryptographic bitstream difference is then returned.
In a preferred embodiment of the present invention, the acquisition module is made up of N axle Motion sensing components, the N axles fortune
Dynamic sensing component is by N axle acceleration sensors and its corresponding processor group into the network system includes cable-network transmission
System and wireless network transmission system.
In a preferred embodiment of the present invention, the N axles Motion sensing component is three-axis moving sensing component, six axles fortune
Any one in dynamic sensing component and nine axle Motion sensing components.
A kind of cryptographic system is based on the application of the disposable random cipher generation method of spatial variations.
In a preferred embodiment of the present invention, many mobile communication equipments of the matching based on spatial variations once
Property random cipher generation method press following operating procedure:
(1)M platforms mobile communication equipment is simultaneously provided with identical cryptographic system and identical and is based on the disposable of spatial variations
Random cipher generation method;
(2)M platforms mobile communication equipment is moved simultaneously operate and obtain synchronous generation feature status information it is concurrent
Send user reminding information;
(3)The feature status information of synchronous generation is generated consistent and synchronous message in cipher by M platforms mobile communication equipment
Breath flows and caches;
(4)Cryptographic bitstream is transmitted and is received by transport module;
(5)The cryptographic bitstream received by itself encrypted message flow verification, is proved to be successful, and carries out next step operation, is tested
Demonstrate,prove failure then return to step(2).
In a preferred embodiment of the present invention, step(1)To step(3)Described in M be more than 2 integer.
The beneficial effects of the invention are as follows:Cryptographic system of the present invention and its disposable random cipher based on spatial variations are generated
Method synchronizes movement with application by two or many mobile communication equipments, gathers mobile message and sets out corresponding
Disposable synchronization key carries out synchronous crypto-operation and the identification protecting of two or many mobile communication equipments, by synchronous shifting
The information such as angular speed, the rate of change of linear acceleration and speed and corresponding earth's magnetic field and its rate of change extracted in dynamic equipment can
With the both sides of communication or it is multi-party between interim key synchronization system is set is encrypted communication and protects.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing, wherein:
Fig. 1 is the one of cryptographic system of the present invention and its disposable random cipher generation method based on spatial variations and application
The flow chart of preferred embodiment.
The mark of each part is as follows in accompanying drawing:1st, acquisition module, 2, coding module, 3, matching module, 4, locking module, 5,
Output module, 6, transport module, 7, authentication module.
Specific embodiment
The technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described implementation
Example is only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area is common
All other embodiment that technical staff is obtained under the premise of creative work is not made, belongs to the model of present invention protection
Enclose.
Fig. 1 is referred to, the embodiment of the present invention includes:
Cryptographic system and its disposable random cipher generation method based on spatial variations, comprise the following steps:
(1)The dynamic-change information of mobile communication equipment is gathered, dynamic feature information is isolated from dynamic-change information;
(2)Dynamic feature information is generated into feature status information according to pre-arranged code mode, is believed according to the significant condition
Breath searches feature set in advance with reference to database, determines the feature status information matching degree;
(3)According to the feature status information matching degree dynamic lock-out state of selection setting, the significant condition letter is met
Breath matching degree, goes to step(4), otherwise, go to step(1);
(4)Lock the feature status information and send user reminding information;
(5)The feature status information for locking is carried out into computing, coding, cryptographic bitstream is generated;
(6)Cryptographic bitstream stores to caching and sends or receive simultaneously by transport module 6.
Step(1)The dynamic feature information is rate of acceleration change, rate of change of angular, change in displacement rate and earth's magnetic field
At least one in vector value and its rate of change.
Step(3)Specifically included according to the feature status information matching degree dynamic lock-out state of selection setting:According to logical
The dynamic-change information that letter equipment is kept in motion obtains corresponding feature status information matching degree, according to the significant condition
Information matches degree locks the feature status information automatically, and the feature status information matching degree includes rate of acceleration change, angle
At least one matching in percentage speed variation, change in displacement rate and geomagnetic fieldvector value and its relevant parameter rate of change, earth magnetism
The rate of change of field vector value includes eccentricity.
Step(5)The establishment of the cryptographic bitstream includes using signature algorithm and Hash(HASH)In algorithm at least one
Kind.
A kind of cryptographic system of the disposable random cipher generation method based on spatial variations, including:
Acquisition module 1:Dynamic-change information for gathering mobile communication equipment, separates from dynamic-change information and sets out
State characteristic information;
Coding module 2:For dynamic feature information to be generated into feature status information according to pre-arranged code mode;
Matching module 3:For searching feature set in advance with reference to database according to the feature status information, institute is determined
Feature status information matching degree is stated, according to the feature status information matching degree dynamic lock-out state of selection setting;
Locking module 4:For locking the feature status information and sending user reminding information;
Output module 5:For using signature algorithm and Hash to the feature status information for locking(HASH)In algorithm
At least one algorithm set AES and corresponding decipherment algorithm, AES by the feature status information generate password
Information flow is simultaneously cached;
Transport module 6:For cryptographic bitstream to be transmitted and be received by network system;
Authentication module 7:For the cryptographic bitstream in other cryptographic systems for receiving to be flowed into the encrypted message of itself
Row contrast verification, cryptographic bitstream is identical, is decrypted using identical decipherment algorithm, and cryptographic bitstream difference is then returned.
In the present invention, the acquisition module 1 is made up of N axle Motion sensing components, and the N axles Motion sensing component is by N axles
Acceleration transducer and its corresponding processor group into, wherein, processor includes motion sensing chip, and processor is to kinesthesia
Surveying the data of component acquisition carries out computing and treatment operation;The present invention relies on current existing motion sensing technology to the feature
Status information matching degree is analyzed and judges.
The network system includes cable network Transmission system and wireless network transmission system.
The N axles Motion sensing component is three-axis moving sensing component, six axle Motion sensing components and nine axle motion sensings
Any one in component;
Wherein, three-axis moving sensing component includes three axis accelerometer, and six axle Motion sensing components include three-axis gyroscope
And three axis accelerometer, nine axle Motion sensing components include three-axis gyroscope, three axis accelerometer and three axis magnetometer;Described three
Axle refers to three directions of length, width and height in space;Can be to the rate of acceleration change of mobile phone, angle speed by N axles Motion sensing component
The dynamic-change information such as degree rate of change, change in displacement rate and geomagnetic fieldvector value and its change of corresponding eccentricity is monitored simultaneously
Measured value is automatically extracted, when measured value is more than reduced value set in advance, measured value is carried out automatically locking concurrently
User reminding information is sent, the feature status information for locking is carried out into computing, encoded, generated specific cryptographic bitstream and deposit
To caching, wherein the algorithm of computing includes signature algorithm and Hash for storage(HASH)Algorithm, the present invention relies on existing signature at present
Algorithm and Hash(HASH)Algorithm carries out computing to the feature status information and treatment is operated.
A kind of cryptographic system is based on the application of the disposable random cipher generation method of spatial variations.
Described many disposable random cipher generation methods based on spatial variations of mobile communication equipment of matching are by following
Operating procedure:
(1)M platforms mobile communication equipment is simultaneously provided with identical cryptographic system and identical and is based on the disposable of spatial variations
Random cipher generation method;
(2)M platforms mobile communication equipment is moved simultaneously operate and obtain synchronous generation feature status information it is concurrent
Send user reminding information;
(3)The feature status information of synchronous generation is generated consistent and synchronous message in cipher by M platforms mobile communication equipment
Breath flows and caches;
(4)Cryptographic bitstream is transmitted and is received by transport module 6;
(5)The cryptographic bitstream received by itself encrypted message flow verification, is proved to be successful, and carries out next step operation, is tested
Demonstrate,prove failure then return to step(2).
Step(1)To step(3)Described in M be more than 2 integer.
In the present invention, the mobile communication equipment intelligent electronic such as including intelligent mobile phone, panel computer, Wearable sensor
Product facility;Wherein, M platforms mobile communication equipment moves operation and includes combining closely M platform mobile communication equipments simultaneously
Produce together and synchronously and move, also including M platforms mobile communication equipment is fixed together simultaneously by other plant equipment for aiding in
It is synchronous to produce motion.
In the present invention, the Hash of use(HASH)Algorithm is one-to-many AES, is One-Way Encryption and can not decrypt
Encryption technology, but Hash(HASH)Algorithm is not the direct encrypted feature status information as other methods, but first
Some treatment are carried out to feature status information, is then re-encrypted.This treatment first done is exactly that basis wants encrypted feature state to believe
The length of breath generates a random salt value, is then together encrypted with this salt value and the feature status information to be encrypted
Cryptographic bitstream is formed, and cryptographic bitstream is stored in the caching in database;In checking, Hash(HASH)Algorithm is first
Salt values are read from database, being then combined with the cryptographic bitstream that other cryptographic systems are submitted to salt values carries out hash
Encryption, then be compared with the cryptographic bitstream of caching in database, it is identical, pass through, do not pass through otherwise;
In addition, Hash(HASH)Algorithm is encrypting again to one-time pad encryption, that is to say, that is secondary encryption, and moves
The equipment dynamic monitoring data that N axle Motion sensing components in communication equipment are detected is random dynamic moving data, with
Time, space, earth's magnetic field and its motion state are all constantly changing, and the collection of data is random and is not easy to imitate, therefore
In theory, Hash(HASH)The random secret key that algorithm combines random feature status information establishment is safer.
Cryptographic system of the present invention and its disposable random cipher generation method based on spatial variations and the beneficial effect applied
It is really:
First, movement is synchronized by two or many mobile communication equipments, gathers mobile message and set out corresponding
Disposable synchronous key carry out synchronous crypto-operation and the identification protecting of two or many mobile communication equipments, by synchronous
The information such as the angular speed, the rate of change of linear acceleration and speed and corresponding earth's magnetic field and its rate of change that are extracted on mobile device
Can the both sides of communication or it is multi-party between interim key synchronization system is set is encrypted communication and protects;Can also be by
This password generation mechanism is comprehensively used with other pin modes that prestore, and strengthens secrecy effect;
2nd, there is key to set compared with common communication key random and synchronous, cipher round results more insure, be difficult by
Imitate and steal, can be widely applied to the fields such as automation equipment identification, paying and encryption file transmission.
Embodiments of the invention are the foregoing is only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair
Equivalent structure or equivalent flow conversion that bright description is made, or directly or indirectly it is used in other related technology necks
Domain, is included within the scope of the present invention.
Claims (6)
1. a kind of cryptographic system of the disposable random cipher generation method based on spatial variations, described based on spatial variations one
Secondary property random cipher generation method, comprises the following steps:
(1)The dynamic-change information of mobile communication equipment is gathered, dynamic feature information is isolated from dynamic-change information;
(2)Dynamic feature information is generated into feature status information according to pre-arranged code mode, is looked into according to the feature status information
Look for feature set in advance with reference to database, determine the feature status information matching degree;
(3)According to the feature status information matching degree dynamic lock-out state of selection setting, the feature status information is met
With degree, step is gone to(4), otherwise, go to step(1);
(4)Lock the feature status information and send user reminding information;
(5)The feature status information for locking is carried out into computing, coding, cryptographic bitstream is generated;
(6)Cryptographic bitstream stores and sends or receive to caching and simultaneously by transport module;
Step(1)The dynamic feature information is rate of acceleration change, rate of change of angular, change in displacement rate and geomagnetic fieldvector
At least one in value and its rate of change;
Step(3)Specifically included according to the feature status information matching degree dynamic lock-out state of selection setting:Set according to communication
The standby dynamic-change information being kept in motion obtains corresponding feature status information matching degree, according to the feature status information
Matching degree locks the feature status information automatically, and the feature status information matching degree includes rate of acceleration change, angular speed
At least one matching in rate of change, change in displacement rate and geomagnetic fieldvector value and its relevant parameter rate of change, earth's magnetic field arrow
The rate of change of value includes eccentricity;
Step(5)The establishment of the cryptographic bitstream includes using signature algorithm and Hash(HASH)At least one in algorithm,
It is characterised in that it includes:
Acquisition module:Dynamic-change information for gathering mobile communication equipment, isolates dynamic spy from dynamic-change information
Reference ceases;
Coding module:For dynamic feature information to be generated into feature status information according to pre-arranged code mode;
Matching module:For searching feature set in advance with reference to database according to the feature status information, the spy is determined
Symptom state information matches degree, according to the feature status information matching degree dynamic lock-out state of selection setting;
Locking module:For locking the feature status information and sending user reminding information;
Output module:For using signature algorithm and Hash to the feature status information for locking(HASH)In algorithm at least
A kind of algorithm sets AES and corresponding decipherment algorithm, and the feature status information is generated cryptographic bitstream by AES
And cache;
Transport module:For cryptographic bitstream to be transmitted and be received by network system;
Authentication module:For the cryptographic bitstream in other cryptographic systems for receiving to be contrasted with the cryptographic bitstream of itself
Checking, cryptographic bitstream is identical, is decrypted using identical decipherment algorithm, and cryptographic bitstream difference is then returned.
2. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 1, it is special
Levy and be, the acquisition module is made up of N axle Motion sensing components, the N axles Motion sensing component is by N axle acceleration sensors
And its corresponding processor group is into the network system includes cable network Transmission system and wireless network transmission system.
3. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 2, it is special
Levy and be, the N axles Motion sensing component is three-axis moving sensing component, six axle Motion sensing components and nine axle motion sensing groups
Any one in part.
4. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 1 is applied to
The many disposable random cipher generation methods based on spatial variations of mobile communication equipment of matching.
5. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 4, it is special
Levy and be, described many disposable random cipher generation methods based on spatial variations of mobile communication equipment of matching press following behaviour
Make step:
(1)M platforms mobile communication equipment is simultaneously provided with identical cryptographic system and identical and is based on the disposable random of spatial variations
Method for generating cipher code;
(2)M platforms mobile communication equipment is moved simultaneously and is operated and is obtained the synchronous feature status information for generating and send use
Family prompting message;
(3)The feature status information of synchronous generation is generated consistent and synchronous cryptographic bitstream by M platforms mobile communication equipment
And cache;
(4)Cryptographic bitstream is transmitted and is received by transport module;
(5)The cryptographic bitstream received by itself encrypted message flow verification, is proved to be successful, and carries out next step operation, and checking is lost
Lose then return to step(2).
6. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 5, it is special
Levy and be:Step(1)To step(3)Described in M be more than 2 integer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410149122.7A CN103986572B (en) | 2014-04-15 | 2014-04-15 | Cryptographic system and its disposable random cipher generation method based on spatial variations and application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410149122.7A CN103986572B (en) | 2014-04-15 | 2014-04-15 | Cryptographic system and its disposable random cipher generation method based on spatial variations and application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103986572A CN103986572A (en) | 2014-08-13 |
CN103986572B true CN103986572B (en) | 2017-07-11 |
Family
ID=51278399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410149122.7A Active CN103986572B (en) | 2014-04-15 | 2014-04-15 | Cryptographic system and its disposable random cipher generation method based on spatial variations and application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103986572B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106204038A (en) * | 2016-06-24 | 2016-12-07 | 广州正峰电子科技有限公司 | The method and device that a kind of password string generates |
CN110365661B (en) * | 2019-06-28 | 2021-11-26 | 苏州浪潮智能科技有限公司 | Network security authentication method and device |
CN110443927B (en) * | 2019-08-12 | 2021-04-27 | 北京百佑科技有限公司 | Visitor password generation method, visitor password verification method, server and intelligent door lock |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001156773A (en) * | 1999-11-25 | 2001-06-08 | Nippon Telegr & Teleph Corp <Ntt> | Encryption method, decoding method, encryption system, encryption device, decoder, storage medium storing encryption program and storage medium storing decoding program |
EP2151086B1 (en) * | 2007-04-30 | 2017-06-07 | Telefonaktiebolaget LM Ericsson (publ) | Method for establishing a random number for security and encryption, and a communications apparatus |
CN101656728B (en) * | 2009-09-24 | 2013-02-13 | 杭州永控科技有限公司 | Secure transmission method using time-varying incidental information flow as key information |
CN101789862A (en) * | 2010-01-25 | 2010-07-28 | 中兴通讯股份有限公司 | Encryption and decryption device and method based on gravity acceleration |
CN102724034A (en) * | 2012-05-17 | 2012-10-10 | 人民搜索网络股份公司 | Encryption/decryption system and method based on space motion |
CN103051460B (en) * | 2013-01-29 | 2015-08-19 | 赵忠华 | Based on dynamic token system and the encryption method thereof of inertial technology |
CN103401689B (en) * | 2013-08-22 | 2017-02-08 | 赵忠华 | Positional information based dynamic token and encryption method thereof |
-
2014
- 2014-04-15 CN CN201410149122.7A patent/CN103986572B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN103986572A (en) | 2014-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103905202B (en) | A kind of RFID lightweight mutual authentication methods based on PUF | |
Lei et al. | A lightweight authentication protocol for UAV networks based on security and computational resource optimization | |
CN107438230B (en) | Safe wireless ranging | |
CN104104500B (en) | A kind of method and apparatus of quantum secure transmission | |
CN104184733B (en) | A kind of RFID lightweight mutual authentication methods encoded based on CRC | |
CN106209823B (en) | A kind of lightweight file remote encryption method under mobile cloud computing environment | |
CN103457722B (en) | Bidirectional identity authentication and data safety transmission providing body area network safety method based on Shamir threshold | |
CN111447053B (en) | Data secure transmission method and system | |
CN103581900B (en) | Communication safety control method, device, the first mobile terminal and mobile healthy equipment | |
CN103414690A (en) | Publicly-verifiable cloud data possession checking method | |
CN107683582A (en) | Certification instruction pen equipment | |
CN105117658B (en) | A kind of cryptosecurity management method and equipment based on finger print identifying | |
CN102594551B (en) | Method for reliable statistics of privacy data on radio frequency identification (RFID) tag | |
CN103986572B (en) | Cryptographic system and its disposable random cipher generation method based on spatial variations and application | |
CN103051460A (en) | Dynamic token system based on inertial technology and encryption method thereof | |
CN112422500B (en) | Cross-platform data transmission method and device, storage medium and electronic device | |
CN103186744A (en) | Terminal encryption and decryption method and terminal | |
CN102185696B (en) | Mobile phone user authentication method without trusted third party on basis of handwriting characteristics | |
CN106131829A (en) | Modified model method for distributing key in a kind of large-scale layer-stepping wireless sensor network | |
CN103138923A (en) | Method, device and system for internodal authentication | |
CN112530053B (en) | Control method and system of intelligent lock, lock equipment, server and storage medium | |
Ji et al. | Survey of secure communications of internet of things with artificial intelligence | |
CN108683500A (en) | A kind of WBAN method for secret protection based on the characteristic of channel | |
CN104539602B (en) | A kind of safety key managing method being applied in cloud storage | |
CN103457915A (en) | Military Internet of Things security protocol capable of being proved in formalized mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220901 Address after: Room 323, Chamber of Commerce Building, No. 929 Binhai Avenue, Danxi Street, Xiangshan County, Ningbo City, Zhejiang Province, 315700 Patentee after: Liu Xiang Address before: 215400 No. 20, Jian Xiong Road, science and Education Town, Taicang, Suzhou, Jiangsu Patentee before: SUZHOU TAIYOU INFORMATION TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |