Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

43results about How to "Avoid being leaked" patented technology

Device for defending invasive attack

The invention discloses a device for defending invasive attack. The device comprises one or more sensors, one or more metal wires, a comparator and a controller, wherein the signal transmitting end of each sensor is used for transmitting a signal, and the signal receiving end of each sensor is used for detecting the integrity of the signal; the metal wires are covered above a protected circuit and used for connecting the signal transmitting ends and the signal receiving ends of the sensors together; the input end of the comparator is respectively connected with the signal transmitting ends and the signal receiving ends of the sensors and used for comparing the signals of the signal transmitting ends and the signal receiving ends, and the output end of the comparator is connected with the data input end of an alarm mark; and the controller is used for controlling the signal update of the signal transmitting ends of the sensors, controlling the comparator to periodically detect the connectivity of the metal wires and enabling the alarm mark to be valid when the connectivity of the metal wires is abnormal. Through the device, the internal signals of an integrated circuit (IC) chip can be effectively prevented from being detected by the invasive attack, the security of user data is protected, and the security strength of the IC chip is improved.
Owner:SHANGHAI HUAHONG INTEGRATED CIRCUIT

Electronic information intelligent storage system for industrial management

The invention discloses an electronic information intelligent storage system for industrial management. The electronic information intelligent storage system comprises a data receiving module, a datasource analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a transfer storage module, a cloud storage module, a data retrieval module, an identity verification module and a login module. The data receiving module is in communication connection with the data source analysis module; the data source analysis module is in communication connection with the virus scanning module; wherein the external virus characteristic information acquisition module is in communication connection with the virus scanning module, the virus scanningmodule is in communication connection with the data processing module, the data processing module is in communication connection with the data classification module, and the data classification module is in communication connection with the data storage module; according to the invention, the security of the stored data can be better ensured, and meanwhile, the system can be more convenient to use and is more suitable for popularization and application.
Owner:深圳市熠华智能科技有限公司

Encryption method, device and equipment based on features of information and storage medium

The embodiment of the invention discloses an encryption method, device and equipment based on features of information and a storage medium, and the method comprises the steps: obtaining a target function for describing information, and the feature information of to-be-processed target information; dividing the target information according to the feature information of the target information to obtain at least two pieces of sub-information; obtaining coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information according to the target function; encrypting the coordinate information of each piece of sub-information in the at least two pieces of sub-information to obtain a ciphertext of the coordinate information corresponding to each piece of sub-information; and determining the ciphertext of the coordinate information corresponding to each piece of sub-information as the ciphertext of the target information, and storing the ciphertext of the target information in a blockchain network. By adopting the method, the security of the target information can be improved, the method is suitable for the field of smart medical treatment, and the construction of smart cities can be further promoted.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Finger vein encryption communication terminal for confidential file

The invention discloses a finger vein encryption communication terminal for a confidential file, and relates to finger vein application equipment and facilities. The terminal comprises a terminal body, a human face identifier, a display, a vein identifier and a loudspeaker, wherein the display, the vein identifier and the human face identifier are arranged on the front surface of the terminal body; the loudspeaker is arranged at the bottom of the terminal body; a human face identification apparatus, a control apparatus and a vein identification apparatus are arranged in the terminal body; the control apparatus is connected with the human face identification apparatus through a lead wire; the control apparatus is connected with the vein identification apparatus through a lead wire; the control apparatus is connected with the human face identifier through a lead wire; the control apparatus is connected with the vein identifier through a lead wire; and the control apparatus is connected with the loudspeaker through a lead wire. Double encryption is performed through the human face identification apparatus and the vein identification apparatus, so that an encrypted file of a user is securer and the contents of the encrypted file can be effectively prevented from being leaked.
Owner:同略科技有限公司

Encryption method and device based on shared root key, equipment and medium

The embodiment of the invention discloses an encryption method and device based on a shared root key, equipment and a medium, and relates to a block chain technology. The method comprises the steps: obtaining a target function used for describing information and a root key corresponding to target information to be processed, wherein the target information comprises at least two pieces of sub-information; generating a key of each piece of sub-information in the at least two pieces of sub-information according to the root key; obtaining coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information according to the target function; encrypting the coordinate information corresponding to each piece of sub-information in the at least two pieces of sub-information by adopting the key of each piece of sub-information to obtain a ciphertext of the coordinate information corresponding to each piece of sub-information; and determining the ciphertext of the coordinate information corresponding to each piece of sub-information as the ciphertext of the target information, and storing the ciphertext of the target information in a block chain network. By adopting the method, the security of information can be improved, the method is suitable for the field of smart medical treatment, and the construction of smart cities can be further promoted.
Owner:PING AN TECH (SHENZHEN) CO LTD

Livestock animal fence entry detection method based on gun-ball linkage and BIM

The invention discloses a livestock animal fence entry detection method based on gun-ball linkage and BIM. The method comprises the following steps: carrying out animal detection on an animal image ofa large-range free-ranging area acquired by a gunlock; carrying out coordinate regression to obtain animal key point coordinates; when the distance between the animal and the fence is smaller than aset threshold value, calling the gunlock; enabling the gunlock to collect a fence entrance image and process the fence entrance image to obtain a fence entrance animal thermodynamic diagram; superposing thermodynamic diagrams of animals at the entrance of the fence, and adjusting the pose of the dome camera after the track disappears; acquiring an animal image of an internal area of the fence, andprocessing to obtain an animal thermodynamic diagram in the fence; counting the number of peak points of animal thermodynamic diagram hot spots in the fence; and combining the WebGIS technology to visualize the livestock breeding area building information model. By means of the animal husbandry in-fence detection system and method, automatic animal husbandry in-fence detection is achieved, the animal husbandry in-fence detection efficiency and precision are improved, and the safety in the data processing and transmission process is improved.
Owner:各珍珍

An electronic information intelligent storage system for industrial management

The invention discloses an electronic information intelligent storage system for industrial management. The electronic information intelligent storage system comprises a data receiving module, a datasource analysis module, a virus scanning module, a data processing module, a data classification module, a data storage module, a transfer storage module, a cloud storage module, a data retrieval module, an identity verification module and a login module. The data receiving module is in communication connection with the data source analysis module; the data source analysis module is in communication connection with the virus scanning module; wherein the external virus characteristic information acquisition module is in communication connection with the virus scanning module, the virus scanningmodule is in communication connection with the data processing module, the data processing module is in communication connection with the data classification module, and the data classification module is in communication connection with the data storage module; according to the invention, the security of the stored data can be better ensured, and meanwhile, the system can be more convenient to use and is more suitable for popularization and application.
Owner:深圳市熠华智能科技有限公司

Method and system for realizing login through borrowing account of others

ActiveCN105610798AFacilitate active lendingActive lending is convenientTransmissionPasswordDatabase
The invention discloses a method and a system for realizing login through borrowing an account of others. The method comprises the following steps that according to an account borrowing request of a borrowing party, a first APP on a borrowing party mobile terminal sends a temporary password input by the borrowing party to an account borrowing management server; the first APP on the borrowing party mobile terminal receives a first account authentication cache file corresponding to the temporary password from the account borrowing management server and stores the first account authentication cache file at a specified position on the borrowing party mobile terminal, wherein the first account authentication cache file contains first account authentication cache information needed for a loaning party to login to a second APP; according to the first account authentication cache file stored at the specified position, the second APP on the borrowing party mobile terminal logins to a server of the second APP by making use of the first account authentication cache information contained in the first account authenticationcache file, namely, the loaning party can enable others to login at a specified application website through the account of the loaning party without providing the account and the password on the specified application website.
Owner:BEIJING QIHOO TECH CO LTD

A method and system for logging in by borrowing someone else's account

ActiveCN105610798BFacilitate active lendingActive lending is convenientTransmissionPasswordComputer science
The invention discloses a method and system for logging in by borrowing another person's account. According to the account borrowing request of the borrower, the first APP on the mobile terminal of the borrower sends the temporary password input by the borrower to the account borrowing management server; the borrower moves The first APP on the terminal receives the first account authentication cache file corresponding to the temporary password returned by the account borrowing management server and stores the first account authentication cache file in a specified location on the borrower's mobile terminal, wherein the The first account authentication cache file contains the first account authentication cache information required by the borrowed party to log in to the second APP; according to the first account authentication cache file stored in the specified location, the second APP on the borrower's mobile terminal uses The first account authentication cache information contained in the first account authentication cache file logs in to the server of the second APP, that is, it is not necessary for the borrowed party to provide the account and password on the designated application website to allow others to pass through the borrowed party's account and password. The account is logged in on the designated application website.
Owner:BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products