Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

105results about How to "Avoid malicious access" patented technology

Multi-dimensional personnel and equipment intelligent positioning wearable device

InactiveCN105137465ARealize full positioning trackingCapable of collecting and processing multi-dimensional positioning dataSatellite radio beaconingWireless communicationRadio frequency signalIBeacon
The invention discloses a multi-dimensional personnel and equipment intelligent positioning wearable device, and the device comprises a wireless communication module which is used for collecting related positioning data and enables the related positioning data to be remotely transmitted; a Beidou / GPS positioning module which is used for collecting and analyzing a Beidou / GPS satellite signals, carrying out position calculation, and outputting latitude and longitude information; a BLE data collection module which is used for collecting the MAC, field intensity and TxPower of a Ibeacon Bluetooth signal; a WIFI data collection module which is used for collecting the MAC and radio frequency signal intensity of a WIFI host; an RFID data collection module which is used for collecting the ID and radio frequency signal intensity of an RFID host; a rotating speed and acceleration measurement module which is used for collecting the acceleration and rotating speed of the device; and a CPU module which is used for the management of the whole unit. The device is suitable for the whole-course positioning of the personnel and equipment in different geographic environments, such as an open environment, an indoor environment, commuting ports, and the like.
Owner:CHENGDU ASIONSYS IND CO LTD

Isolation method and isolation device for application program

The invention provides an isolation method and an isolation device for an application program. The method comprises steps as follows: when a to-be-isolated application program stored in a storage path in a non-isolation region is detected, the storage path of application data of the to-be-isolated application program is modified to be a storage path in an isolation region; the access right of the application data in the storage path in the isolation region is modified, and only the application program has the access right to the application data. According to the technical scheme, the application data of the application program which needs to be protected are independently stored in the isolation region, so that only the isolated application program in the isolation region has the access right to the application data, and any application program outside the isolation region has no access right to the application data of the isolated application program in the isolation region; the probability that a malicious application program in the non-isolation region has access to private data of a user in the application data of the isolated application program is avoided; the safety of the isolated application program and the data safety and the property safety of a user are protected better.
Owner:BEIJING ANYUNSHIJI TECH CO LTD

Micro-power consumption control method of motion monitoring and tracking equipment

The invention discloses a micro-power consumption control method of motion monitoring and tracking equipment. A hardware energy consumption management and control part and a software energy consumption dynamic strategy part are combined; in the hardware energy consumption management and control part, by adopting control CPU frequency reduction and IO configuration, embedded secondary development of a communication CPU module, and complete isolation between the communication CPU module and a power supply, a dormant current of a whole machine is enabled to be smaller than 5 [mu]A; and in the software energy consumption dynamic strategy part, after a remote background server receives reported data of a terminal, according to parameters of the terminal, a terminal energy consumption managementand control strategy is formulated and sent to the terminal for execution. By controlling the power consumption of the whole machine, during the dormant period, the working current of the whole machine is less than 5 [mu]A; and in the tracking period, the communication CPU module works and performs data interaction with the remote server, the power consumption of the whole machine is less than 80mA, and when the communication CPU module is dormant in the tracking period, the power consumption of the whole machine is less than 1 mA.
Owner:CHENGDU ASIONSYS IND CO LTD

Parameter sending method of storage chip of imaging box, storage chip and imaging box

The invention provides a parameter sending method of a storage chip of an imaging box, the storage chip and the imaging box. The method comprises the following steps of receiving an instruction sent by printing imaging equipment, and sending a key parameter to the printing imaging equipment when the instruction is judged as the key parameter reading instruction, wherein the key parameter is generated by the storage chip. The parameter needing to be read by the printing imaging equipment is generated by the storage chip, when the printing imaging equipment sends the reading instruction, the parameter generated by the storage chip is sent to the printing imaging equipment, the parameter cannot be directly read by the printing imaging equipment at any time, and therefore certain important parameters in the storage chip can be prevented from being obtained maliciously. Furthermore, a compatible manufacturer or an original manufacturer of the storage chip does not need to store the complete and specific parameter in the storage chip, a competitor can be prevented from directly reading the storage chip and obtaining certain important parameters, and therefore certain important parameters in the storage chip can be protected.
Owner:APEX MICROELECTRONICS CO LTD

Program control flow obfuscation method and system, storage medium, cloud server and application

The invention belongs to the technical field of control flow obfuscation, and discloses a program control flow obfuscation method and system, a storage medium, a cloud server and an application. Branch statement judgment conditions in an original program are hidden, and a control flow query function is used for replacing the branch statement judgment conditions; the control flow is further obfuscated by inserting a pseudo-branch statement into the program; the conversion program is sent to an untrusted public cloud, and a control flow matrix is sent to a trusted private cloud; and the conversion program is run on the public cloud based on the control flow matrix. According to the invention, the variable of each branch statement condition can be hidden, so that application program logic isprevented from being maliciously acquired and utilized by an external attacker; a pseudo branch statement is inserted to increase the difficulty of reconstructing a program control flow by an attacker; and a relation constraint statement is inserted, and data flow consistency check is carried out, so that an attacker is resisted to actively change the running process of a program, and new data ispurposefully added in the program running process to collect effective information.
Owner:XIDIAN UNIV

Novel cross-network data exchange mode and communication method

The invention discloses a novel cross-network data exchange mode and a communication method, the novel cross-network data communication method comprises the following steps: firstly, uploading data bya source data end, then creating a digital package, then carrying out technical auditing, then carrying out manual auditing, then carrying out data local caching and encryption, and then carrying outcross-network ferry; and performing data packet local caching, then performing analysis and verification, and finally performing access control and data receiving. According to the invention, the Ftrans cross-network file security exchange system is adopted to carry out cross-network transmission of the file, compared with the traditional exchange mode, the transmission speed is faster, and in addition, the anti-virus and sensitive information detection functions are realized. According to the invention, the encryption unit is arranged in the communication method, so that the security in thefile transmission process can be further improved; and the novel cross-network data exchange mode and the communication method have a temporary storage function, file exchange does not need to be carried out again in a short time, and when the time from last exchange is too long, only the cloud needs to be logged in to download data.
Owner:杭州奔浪信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products