Unconditional secure communication method based on beam-forming and security code

    公开(公告)号:US09985986B2

    公开(公告)日:2018-05-29

    申请号:US15306094

    申请日:2015-06-26

    Abstract: The present invention discloses an unconditional secure communication method based on beam-forming and security code, which comprises the following steps of: Legitimate users send to the signal pie-encoded and modulated, meanwhile eavesdropper receives signals and calculates the bit error rate; computing security coding parameters, legitimate received users send pilot sequence, and legitimate sending users estimate legitimate channel, and extract information on legal channel coding and modulating signal was SVD pre-coding and sending; the signal was decoded, that will be judgment and demodulation then the signal after decoding do security code is transmitted to message or tapping, due to lack of legal channel information, eavesdropper cannot lift pre-coding processing of the received signal with the high bit error rate. This method can establish advantages channel of the wiretap model channel and to ensure that legitimate users can receive signals at the lower bit error rate.

    Quantitative selection of secure access policies for edge computing system

    公开(公告)号:US11374969B2

    公开(公告)日:2022-06-28

    申请号:US17298610

    申请日:2019-12-27

    Abstract: A quantitative method for the security access strategy selection of the edge computing terminals includes the following steps: S1. Quantifying and ranking the security risks according to the terminals and data application requirements under the edge computing system. S1. Quantifying and ranking the security risks according to the terminals and data application requirements under the edge computing system. S2. Calculating the security quantification value of terminal and data application. S3. Giving the weight coefficients for the security risk protection of the security access strategies for the terminal and data in the edge computing side. S4. Give the corresponding value of each security strategy to the corresponding terminal and data security protection. S5. Select the corresponding algorithm according to the data set in S4 to select the security strategies.

Patent Agency Ranking