Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

62results about How to "Avoid Malicious Modifications" patented technology

File security control and trace method and system based on digital fingerprints

The invention discloses a file security control and trace method and system based on digital fingerprints. The method includes the file uploading procedure and the file downloading procedure. In the file uploading procedure, when a user uploads files to a file server, the file server starts a natural language analysis program and conducts full-context scanning and matched analysis on file contexts, a position where the digital fingerprints can be inserted is found, a fingerprint feature position list is generated, the fingerprint feature position list and original files are stored in the file server together, the uploading and downloading record list is generated, and information uploaded this time is recorded. In the file downloading procedure, when the user sends a file downloading request to the file server, the file server generates binary random codes with the same length according to the length of the fingerprint feature position list, when the random code corresponding position is 1, the digital fingerprints are inserted in the contexts at the corresponding position, a new file is generated and sent to the user, and meanwhile the downloaded information is recorded in the uploading and downloading record list. By means of the method and system, the context files can be traced back, and the security of the context files is managed.
Owner:陈佳阳 +1

Electric energy meter single enclosure structure

An electric energy meter single enclosure structure designed according to the invention solves the technical problems of complex operation and low efficiency in the current electric energy meter enclosure. The structure comprises an electric energy meter shell and a flip cover, wherein the flip cover is engaged with the upper part of the shell in a covering manner and is provided with a through hole thereon, a metal piece with a slot is embedded on a surface where the shell is corresponding to the through hole, the upper part of the slot is a reverse step structure with narrow outside and wide inside, a bolt with a buckle on the tail thereof penetrates through the through hole to be in clamping connection with the metal piece, and the buckle is buckled on the step surface of the slot, and the head of the bolt adopts a step-shaped structure and the step surface thereof abuts against a working surface of the flip cover. The electric energy meter single enclosure structure can prevent the electric energy meter from being modified viciously during the use of the electric energy meter, and the bolt clamping connection structure is not exposed so as not to be restored after being destroyed, the sign representing that the electric energy meter is destroyed can be easily found, the destroyed electric energy meter can be replaced in time, and the anti-electricity theft effect is excellent.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +1

Method, device and system for determining watching live broadcast duration

The invention discloses a method, device and system for determining live broadcast watching duration, and belongs to the technical field of the Internet. The method comprises the following steps: receiving an adding request which is sent by a terminal and corresponds to a target live broadcast room, adding a login account of the terminal into the target live broadcast room, and sending a live broadcast video stream of the target live broadcast room to the terminal; receiving a watching notification sent by the terminal according to a preset period in the process of playing the live video stream of the target live broadcast room; when an exit notification sent by the terminal is received, determining live broadcast watching duration based on the receiving moment of the joining request and the receiving moment of the exit notification; and when other watching notifications or quitting notifications are not received within a preset duration after the watching notifications are received, determining the watching live broadcast duration based on the receiving moment of the joining request and the receiving moment of the finally received watching notifications. According to the invention, the accuracy of the live broadcast watching duration of the user recorded by the server can be improved.
Owner:GUANGZHOU KUGOU TECH

Autonomous behavior-based product marketing support system and method

The invention relates to an autonomous behavior-based product marketing support system and method, is a support system which can provide marketing management for a plurality of products at the same time and initiatively provides a novel product marketing mode which is suitable for ordinary users to participate extensively and has great influence. Except for relevant network elements and various product marketing platforms of an original telephone switching network, the product marketing support system is also provided with the autonomous behavior-based product marketing support platform. The system has the following main functions: mainly adopting user autonomous promotion in a short message or network mode to provide parallel support for multi-product and multi-region marketing; and meanwhile, ensuring that transmission or marketing tasks of each product or service are independent to realize noninterference among promotion and transmission tasks. Moreover, the marketing support system and method can strictly limit participating populations and regions and provide real-time marketing awards for participating users. Meanwhile, marketing personnel can learn personal marketing performance in real time, thereby furthest arousing the working enthusiasm of marketing personnel.
Owner:BEIJING DASCOM TECH +1

Multistage flow table management and control method and system for virtual machine

The invention discloses a multistage flow table management and control method and system for a virtual machine. The multistage flow table management and control method for the virtual machine comprises the following steps: generating a port-mac binding flow table rule, and issuing the port-mac binding flow table rule to a flow table 0; registering an idle flow table N, and issuing the port-mac binding flow table rule to the flow table N; generating a multi-level flow table distribution rule, and issuing the multi-level flow table distribution rule to the flow table 1; and when the message enters the Openflow switch, when it is determined that the message is sent by a virtual machine according to a port-mac binding flow table rule of a flow table 0, forwarding the flow table of the messageto a corresponding flow table N according to a multi-stage flow table distribution rule of a flow table 1. According to the management and control method and system provided by the invention, the flowtable of the Openflow switch and the Mac address of the virtual machine access network card are used as unique identifiers of virtual machine network resources; according to the method, rapid indexing and resource allocation of the SDN controller are realized, and the virtual machine Mac address is used as a key matching item for multistage flow table distribution, so that the effect of preventing the virtual machine from maliciously modifying the Mac address can be achieved.
Owner:GUANGZHOU BINGO SOFTWARE

Method and system for modifying password of encryption lock

ActiveCN102902927AAvoid Malicious ModificationsThe modification process is safe and controllablePlatform integrity maintainancePasswordEncryption
The invention discloses a method and a system for modifying a password of an encryption lock. The method comprises the steps that: when the user trigger information is received, a host judges whether an authorized lock and an operation lock are connected with the host, if so, the host transmits the modification information to the authorized lock, otherwise, the operation is ended; the authorized lock receives the modification information and obtains a new password; the authorized lock processes the new password and transmits the processing result and the new password to the host; the host generates a verification instruction according to the processing result and the new password and transmits the verification instruction to the operation lock; the operation lock analyzes and verifies the received verification instruction, if verification instruction is verified to be qualified, the internally stored password is replaced by the analyzed new password, the modification success information returns to the host, and the operation is ended; otherwise the failure information returns to the host, and the operation is ended. According to the technical scheme, an agent or a developer can modify the password of the operation lock by utilizing the authorized lock, namely the password is modified under the control of a manufacturer, malicious modification is avoided, and the modification process is safe and controllable.
Owner:FEITIAN TECHNOLOGIES

MIPS (Million Instructions Per Second) platform Web access strategy control method

The invention discloses an MIPS (Million Instructions Per Second) platform Web access strategy control method. According to the MIPS platform Web access strategy control method, strategy setting of users of a client browser is uniformly managed and controlled in a centralized manner by a strategy server; the browser requests for the strategy server at certain time intervals; the strategy server manages strategy information of the users and returns the strategy information of the users to the client browser; the browser implements corresponding control according to the related strategy information. The MIPS platform Web access strategy control method has the advantages that control on an MIPS platform Web access strategy, functions of URL (Uniform Resource Locator) access blacklist control, URL access white list control and a forced home page address setting strategy, a function that whether a bookmark is editable, a function of installing a blacklist on an extension and functions of a download directory setting strategy, a plug-in URL white list, a plug-in URL blacklist and the like of the browser, are implemented, so that a local terminal can be protected and the users are prevented from accessing malicious websites, operating malicious plug-ins, installing malicious extensions, maliciously modifying a home page of the browser and the like.
Owner:中软信息系统工程有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products