Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

271results about How to "Avoid monitoring" patented technology

Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock

The invention provides a Bluetooth-based unlocking method, system and hand-held terminal and a Bluetooth-based electronic lock. The method comprises steps as follows: the hand-held terminal with a Bluetooth function is bound with the electronic lock in a Bluetooth communication manner, and an unlocking password of the electronic lock is generated; when the electronic lock is unlocked, the hand-held terminal sends an unlocking request and sends a hash value acquired through hash calculation to the electronic lock after a group of random numbers fed back from the electronic lock are received and a combination of user ID (identification), the unlocking password and the random numbers is subjected to hash calculation; the electronic lock matches the hash value acquired after hash calculation of the combination of the user ID, the unlocking password and the random numbers with a hash value received by the hand-held terminal, and the electronic lock is unlocked after matching succeeds. Interactive authentication is performed in a hash encryption manner, monitoring by a third party can be prevented, the condition of secret key disclosure is avoided, the unlocking speed is high, and the safety of the electronic lock is effectively improved.
Owner:上海觅奇智能科技有限公司

Method and device for determining operating performance of application program and mobile terminal

The invention provides a method and a device for determining the operating performance of an application program. The method comprises the steps of monitoring a startup event of a specified application program, obtaining operating data of an application interface to determine the operating smoothness of the application in the operating process of the specific application program, obtaining occupation time of a specified application on a system resource to determine the resource occupancy rate of the application and obtaining elapsed time of an application activity assembly lifecycle function to determine the operating time of the application; and determining the operating performance of the specified application program according to at least one of the operating smoothness, the resource occupancy rate or the operating time. Only the specified application program is monitored, so that overall monitoring of all application programs can be avoided, the data collection work is reduced and the data collection efficiency is improved. Furthermore, the accuracy of judging the operating performance of the application can be effectively improved through collecting the data such as the operating smoothness, the resource occupancy rate and the operating time of the specified application. The invention further provides a mobile terminal.
Owner:BEIJING QIHOO TECH CO LTD

Control method and system for intelligent lock and related device

The invention discloses a control method and system for intelligent lock and a related device. The method comprises the steps that a mobile terminal acquires identification information of the intelligent lock and sends the identification information to a cloud server, so the cloud server acquires first key information corresponding to the identification information; the mobile terminal receives the first key information sent by the cloud server and sends an authentication instruction to the intelligent lock, so after the intelligent lock authenticates the mobile terminal successfully, the intelligent lock sends a first random number to the mobile terminal, and a first unlocking password is generated according to the first random number, wherein the authentication instruction is used for verifying legality of the mobile terminal; and the mobile terminal generates a second unlocking password of the intelligent lock according to the identification information, the first key information and the first random number, the unlocking operation is carried out on the intelligent lock according to the second unlocking password, and the unlocking operation is finished when the first unlocking password matches the second unlocking password. Through application of the method, the system and the related device, a secure communication demand among the cloud server, the intelligent lock and themobile terminal can be satisfied.
Owner:HUAZHONG UNIV OF SCI & TECH

Wireless sensor network node device used in underground coal mine

The invention discloses a wireless sensor network node device used in an underground coal mine, which belongs to a hardware platform for personnel positioning and environmental monitoring based on a wireless sensor network in the underground coal mine. The wireless sensor network node device used in the underground coal mine is provided with wireless sensor fixed nodes (1) and wireless sensor mobile nodes (2); the sensor fixed nodes (1) are placed on a tunnel wall from space to space in the underground coal mine; and the sensor mobile nodes (2) are worn by mining personnel. The device has the following advantages: 1) the device has high positioning accuracy, and the mobile nodes carried by the personnel transmit wireless signals to communicate the approaching fixed nodes so as to determine the position of the device and improve the positioning precision; 2) both the wireless sensor fixed nodes and the wireless sensor mobile nodes have the capacity of bidirectional communication so as to accurately position the position of the personnel; 3) the design cost of the wireless sensor nodes is comparatively low, large amount of nodes can be arranged, and drain regions and blind points of positioning and monitoring are avoided; and 4) the arranged wireless sensor fixed nodes do not need wire connection, so the cost is low.
Owner:CHINA UNIV OF MINING & TECH

Electric vehicle safety control system and method

The invention discloses an electric vehicle safety control method. The electric vehicle safety control method comprises a preparation process: when a mobile phone is in a certain range far away from an electric vehicle, enabling the electric vehicle to find the mobile phone which is getting close through technological manners such a Bluetooth or wireless local area network wifi through presetting and to transmit a preparation signal to the mobile phone such that both the electric vehicle and the mobile phone enter a preparation state; a starting process: clicking the NFC (Near Field Communication) interaction region of the electric vehicle by using mobile phone NFC to start a two-dimensional code acquisition camera, generating a disposable two-dimensional code with unfixed data through a designated algorithm by an application installed in the mobile phone in order to execute a confirmation operation during setting of functional parameters of the electric vehicle; enabling the authorized mobile phone to get close to the camera of the electric vehicle and displaying the correct two-dimensional code through a screen, wherein the electric vehicle is not started until the camera of the electric vehicle captures the two-dimensional code and verifies that the two-dimensional code is valid.
Owner:SHANDONG BEGREEN NEW ENERGY TECKNOLOGY CO LTD

6LoWPAN-based intelligent fire-fighting service system for colleges and universities and design method

The invention discloses a 6LoWPAN-based intelligent fire-fighting service system for colleges and universities and a design method of the 6LoWPAN-based intelligent fire-fighting service system. The service system comprises a data acquisition layer, a data transmission layer, a data control layer and a system application layer, good interoperability of the 6LoWPAN can solve information isolation, the 6LoWPAN supports the intercommunication with other IEEE (Institute of Electrical and Electronic Engineers) 802.15. 4 equipment and supports the interconnection with other IP networks; through designing a data control layer based on fire-fighting big data, intelligentized analysis of data, intelligent control on fire-fighting equipment, a visual service platform is established; through analyzingand mining fire-fighting big data, the fire situation is predicted and a solution is formulated, the fire prevention and control efficiency is improved, the intelligence of a service platform is realized, the purposes of equipment management centralization, fire-fighting construction underlying data management intellectualization and management system platformization are achieved, and the systemhas the characteristics of high feasibility, convenience in networking and easiness in maintenance and upgrading.
Owner:CENT SOUTH UNIV +1

Wireless video monitoring system based on wide water domain

The invention discloses a wireless video monitoring system based on a wide water domain. A ship, vehicle and boat hybrid monitoring manner is adopted to establish a monitoring system, a wireless-based network-carrying system is constructed for a ship-vehicle-boat monitoring system, wireless network coverage is carried out by a 3G (The 3rd Generation Telecommunication)+WiMAX (Worldwide Interoperability for Microwave Access)+WiFi (Wireless Fidelity) hybrid architecture mode, servers are erected on a boat, a vehicle and a boat for transmitting and processing videos, and video data acquired by the ship, the vehicle and the boat are transmitted to a monitoring center through the network-carrying system. The monitoring system based on the wide water domain, provided by the invention, has the advantages of good coverage type, flexibility in detection, no influence from weather environment, and the like, can better avoid the defect brought by traditional satellites, can be used for monitoring the wide water domain in real time, has a aerial panorama with the formation time reduced from traditional 3-7 days to about 1-2 days, and can work under weather conditions such as rain, snow, fog and the like that the traditional satellites can not form an image and give a corresponding result image.
Owner:NANJING UNIV

Method, device and system for performing security prediction based on feature information

The application discloses a method and device for performing security prediction based on feature information, an electronic device, a method and device for acquiring the feature information, an electronic device, and a system for performing security prediction based on the feature information. The method for performing security prediction based on the feature information comprises the following steps: receiving the feature information of a monitored party sent by the monitored party; calculating the security state information of the monitored party according to the prestored risk occurrence probability corresponding to the feature information of the monitored party; judging whether the security state information of the monitored party exceeds a first threshold; and executing corresponding processing operations according to the judgment result. By adopting the method disclosed by the application, the problem that potential safety hazards are caused as the preset monitoring hidden conditions cannot cover the potential risk factors in the surrounding environment can be solved, the hidden dangers that cannot be reflected by the spatial information can be monitored; and through the identification and early warning of the feature information, an alert is made before the occurrence of the hidden dangers to avoid the occurrence of the hidden dangers, and the problem of traffic waste can be solved.
Owner:ALIBABA GRP HLDG LTD

Data transmission method, terminal, electronic signature device and system

The invention provides a data transmission method. The data transmission method includes that the terminal is in NFC connection with an electronic signature device; the electronic signature device sends a Bluetooth address of the electronic signature device to the terminal through NFC connection; the terminal sends the Bluetooth address of the terminal and a first message to the electronic signature device through NFC connection; the electronic signature device processes the first message and obtains a second message and broadcasts the Bluetooth address of the electronic signature device; the terminal performs Bluetooth address scanning and acquires the Bluetooth address obtained through the NFC connection; the terminal establishes Bluetooth connection with the electronic signature device corresponding to the acquired Bluetooth address; the electronic signature device sends the second message to the terminal through Bluetooth connection. According to the invention, by the wireless connection means based on the combination of NFC technology and Bluetooth technology, abrasion of a wired interface is avoided, so that complicated matching processes of Bluetooth connection are avoided and data theft and interception are prevented. Therefore, data security is ensured, data transmission rate is improved and user experience is improved.
Owner:TENDYRON CORP

Method, device and equipment for creating vTPM (Virtual Trusted Platform Module) and computer readable storage medium

The application discloses a method for creating a vTPM (Virtual Trusted Platform Module). The method comprises the steps of: when receiving an instruction of creating the vTPM, acquiring configurationparameters of the vTPM, wherein the configuration parameters comprise an access interface parameter, a rear end driving parameter and a storage space parameter; then arranging a memory in a virtual machine for the vTPM and according to the access interface parameter, arranging an access interface of the virtual machine and the vTPM; according to the rear end driving parameter, arranging a rear end driver of the vTPM; and then according to the storage space parameter, setting a storage space of the vTPM and setting a storage mechanism of the storage space. By creating the vTPM in the virtual machine according to the configuration parameters, setting functions of the vTPM and providing a trusted root for the virtual machine, monitoring and operation on creation and application of the vTPM of the virtual machine by a host machine are avoided, and safety of the virtual machine is improved. The application further discloses a device and equipment for creating the vTPM and a computer readable storage medium which all have the above-mentioned beneficial effects.
Owner:INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products