Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

812results about How to "Avoid risk of leakage" patented technology

Pressure cooker

The invention discloses a pressure cooker which comprises a cooker body, a lid integrated component, a lid assembly and a first locking component. The lid integrated component is pivotally connected onto the cooker body, the lid assembly is rotatably arranged on the lid integrated component along the peripheral direction of the cooker body and comprises a lid, a trigger assembly and a buckle device, the lid is connected with the lid integrated component by the buckle device, the trigger assembly is connected with the buckle device and is structured in such a manner that the buckle device can be released when the trigger assembly is triggered, and accordingly the lid can be separated from the lid integrated component; the first locking component is arranged on the lid integrated component, the buckle device can be driven by the trigger assembly to rotate between a first location and a second location relative to the lid integrated component, the trigger assembly can be triggered when the buckle device is positioned at the first location so as to relieve the buckle device, and the lid assembly and the lid integrated component cannot be detached when the buckle device is positioned at the second location. The pressure cooker in an embodiment of the invention has the advantage that the service safety of the pressure cooker can be improved.
Owner:谛卓(北京)咨询顾问有限公司

Construction method for preventing and treating cracks between concrete structure and filler wall

The invention discloses a construction method for preventing and treating cracks between a concrete structure and a filler wall. The construction method particularly comprises the following operation steps of step one, preparing construction; step two, treating a basic layer; step three, conducting paying off wire and setting up height pole; step four, conducting brick laying and putting down the bottom row of bricks; step five, masoning the filler wall; step six, constructing plain concrete constructional columns; step seven, filling the top of masonry. The construction method for preventing and treating the cracks between the concrete structure and the filler wall has the advantages of being wide in application range, and applicable to masonry construction of the filler wall with hollow bricks, autoclaved aerated concrete blocks and the like of the industrial and civil construction concrete structure; when the method compared with traditional processes, being capable of saving cost due to the fact that the main difference in procedure is that the plain concrete constructional columns, concrete reinforcing bands, wall crown filled with hard concrete and other portions replace the masonry; fundamentally solving the problem that cracks of a plaster layer and a coating layer caused by the cracks of the contact surface of the concrete structure and the filler wall, improving a project impression level and project quality, eradicating leakage risks of outer wall surfaces, reducing reworking cost and maintenance cost, saving materials, reducing production of construction waste, lowering a complaint rate of users, and being capable of setting up a corporate image in society and considerable in social benefit.
Owner:CHINA AEROSPACE CONSTR GROUP +1

Alarm and blocking method for illegal external connections

The invention relates to an alarm and blocking method for illegal external connections. The alarm and blocking method comprises that 1), an intranet host client monitors networking behaviors of intranet computers in real time according to a plurality of external connection modes; 2), the intranet host client initiatively sends an encrypted alarm data packet to an external connection alarm monitoring terminal by using a Libnet function library to detect whether the intranet computers have external connection behaviors and gives an alarm for illegal external connection behaviors; 3), the intranet host client performs bottom layer packet capture on alarmed intranet hosts to obtain all data packets passing through network cards of the hosts to judge the illegal external connection behaviors; 4), blocking the network cards of the hosts having the illegal external connection behaviors through judgment. The alarm and blocking method is high in timeliness and good in monitoring performance in the aspect of illegal external connection monitoring. By means of the alarm and blocking method, the safety and the transmission efficiency of the alarm data packets in systems are improved, leaking risks caused by stealing of alarm information are effectively avoided, meanwhile, the safety of software is improved, and the software has anti-shielding and anti-unloading capacities.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Hospital information supervision platform and method

The invention provides a hospital information supervision platform and method. The hospital information supervision platform comprises a distributed block chain network constructed by adopting a plurality of data source parties and one or more data application parties as supervision nodes and further comprises a block chain key generation module, a distributed storage module and a sensing prompting module. The block chain key generation module adopts the block chain technology for enabling medical key information of the supervision nodes in the distributed block chain network to generate corresponding block chain keys through an encryption algorithm; the distributed storage module stores the block chain keys into all the supervision nodes of the distributed block chain network; the supervision nodes are communicated in the distributed block chain network; if medical key information of any supervision node is modified, the corresponding block chain key changes, and the other supervision nodes can sense the changes and give a prompt. The platform achieves multi-point self-supervision and intelligent prompting, the medical key information safety management cost is lowered, and the medical key information of a hospital can be prevented from being modified improperly.
Owner:谭小刚

Mobile payment system and method based on bank virtual card number

The invention relates to a mobile payment system based on a bank virtual card number. The mobile payment system based on the bank virtual card number comprises a payment device, a card issuing bank server, a third party payment server, a POS (machine point of sale machine), an acquiring bank server, a card organization server, a commercial tenant server and a BVA SP server, wherein the payment device generates the bank virtual card number used as a primary account number of a payment request or a transfer request, a payment request is sent to the card issuing bank server through transfer transmission of the POS, the acquiring bank server and the card organization server or a transfer request is sent to the card issuing bank server through transfer transmission of the BVA SP server, the card issuing bank server completes transfer or payment, and when the payment device uses a third party payment server for the payment, the card issuing bank server is communicated with the third party payment server through the transfer transmission of the BVA SP server, and completes the payment or the transfer after the payment request or the transfer request is verified. Compared with the prior art, the mobile payment system based on the bank virtual card number has the advantages of improving mobile payment safety, being strong in compatibility, facilitating operation of a user and the like.
Owner:SHANGHAI HAUKIT INFORMATION TECH CO LTD

Authentication method based on homomorphic encryption, user equipment and authentication server

The invention discloses an authentication method based on homomorphic encryption. The authentication method comprises the following steps: generating a secret key and a public key of a homomorphic encryption algorithm for a user; storing the secret key in mobile storage equipment; collecting original biological features of the user, encrypting the original biological features by using the public key to generate the original biological feature ciphertext; and sending the original biological feature ciphertext to store in an authentication server, thereby accomplishing the registration; collecting the current biological features of the user, and encrypting the current biological features by using the homomorphic encryption algorithm to generate the current biological feature ciphertext; sending the current biological feature ciphertext to the authentication server, requesting the authentication under the ciphertext state, and acquiring the secret key in the mobile storage equipment, decrypting the authentication information by using the secret key and sending the decryption result to the authentication server. Through the adoption of the method disclosed by the invention, the biological features are authenticated under the ciphertext state, the strong safety guarantee is provided, and the biological feature information leakage of the user is avoided.
Owner:陈智罡

Authentication method and authentication system among mobile devices

The invention relates to an authentication method and an authentication system among mobile devices. The authentication method includes that after selecting an initiator account number, an initiating device obtains a first authentication token for mobile payment, identity authentication and ticket verification through an encryption method and sends the first authentication token to a receiving device; after selecting a receiver account number, the receiving device encrypts to generate a second authentication token on the basis of the first authentication token and forwards the second authentication token to a credible bank service manager server; the credible bank service manager server is communicated with a corresponding primary account number manager server or a secondary account number manager server according to content of the second authentication token to obtain a fed back authentication request verification result, generates a second authentication token verification result and forwards the second authentication token verification result to the initiating device, the receiving device and the primary account number manager server or the secondary account number manager server corresponding to the receiver account number. Compared with the prior art, the authentication method and the authentication system have the advantages that mobile authentication safety is enhanced, mobile authentication compatibility is increased, user experience is improved and the like.
Owner:上海太炎信息科技有限公司

Cold and hot integrated box body structure

The invention provides a cold and hot integrated box body structure comprising a main body of a box body with an upper opening, wherein the main body of the box body comprises a bottom plate and a side plate, the bottom plate and the side plate are used for constituting an accommodation cavity for accommodating a battery, a liquid cooling system and a heating system are alternately distributed in the bottom plate, at least one fluid inlet and at least one fluid outlet communicated with the liquid cooling system are formed in the side plate, the liquid cooling system is cooling fluid flow channels distributed in the bottom plate in a snake shape, the heating system comprises a first hollow cavity arranged between cooling fluid flow channels and a heating device padded in the first hollow cavity, and a flow channel bridge used for changing the flow direction of the fluid is arranged at the reserving site of the cooling fluid flow channel. According to the box body structure provided by the invention, the liquid cooling system, the heating system and a heat insulation system are highly integrated with the section bar box body, thereby improving the weight energy density ratio and the volume energy density ratio of the battery and reducing and even eliminating the fluid leakage risk of the cooling fluid.
Owner:TIANJIN ENERGIES

Softphone encryption and decryption method and device and computer readable storage medium

The invention discloses a softphone encryption and decryption method and device and a computer readable storage medium. The method comprises the steps of: when receiving a softphone calling instruction, acquiring a phone number corresponding to the calling instruction, and carrying out encryption on the phone number to generate a ciphertext phone number; sending the ciphertext phone number to a phone platform server, so that the phone platform server returns the ciphertext phone number to a local system server by a special network; and carrying out decryption on the ciphertext phone number bythe local system server to obtain a cleartext phone number, and sending the cleartext phone number to the phone platform server by the special network. According to the scheme, both phone number encryption and decryption for a softphone are carried out by the local system server, and a secret key does not need to be sent to the phone platform server, and thus, security is high, and the case that the secret key is intercepted in the transmitting process is avoided; and the decrypted phone number is sent to the phone platform server by the special network, so that the leakage risk is further avoided, and security of personal information of a client is ensured.
Owner:PING AN TECH (SHENZHEN) CO LTD

Cooling device of heat pipe fins for power battery system and mode selecting method

The invention relates to a cooling device of heat pipe fins for a power battery system and a mode selecting method. The cooling device of the heat pipe fins for the power battery system comprises a battery box, wherein a plurality of battery module groups are arranged in the battery box in parallel; each battery module group is provided with a heat pipe group in a matched manner; and two ends of each heat pipe group penetrate through the battery box and are connected with cooling fins. The mode selecting method comprises the following steps: establishing equivalent heat resistance models of the heat pipe groups and the cooling fins; establishing a concentrated parameterized ID heat transfer modules for a main heat transfer path after the equivalent heat resistance models are established; establishing a partial differential equation of a heat transfer process of each element; and after determining a convective heat transfer coefficient (h) required for the system, selecting a cooling scheme. The cooling device of the heat pipe fins for the power battery system has the advantages of high cooling efficiency, low complexity of the system and high safety; meanwhile, the expandability is high, the cooling mode can be randomly adjusted according to actual demands of products, and the degree of standardization is high; and IP67 design of the battery box is realized easily, space and cost are saved, and safety of the power battery system is improved.
Owner:杭州捷能科技有限公司

Passive outboard cooling system suitable for underwater platform

The invention discloses a passive outboard cooling system suitable for an underwater platform, and relates to the field of underwater platform cooling systems. The passive outboard cooling system suitable for the underwater platform comprises a passive heat exchanger and a fresh water circulating pipeline. The passive heat exchanger is arranged outside the board and vertically arranged in the region which is located between a pressure-resistant shell and a light shell. The fresh water circulating pipeline is arranged in a cabin. The passive heat exchanger comprises heat exchange tubes, a firstwater collecting chamber and a second water collecting chamber. The first water collecting chamber and the second water collecting chamber are connected with a water inlet and a water outlet formed in the light shell through connecting pipes correspondingly, and filtering screens are installed in the water inlet and the water outlet. A shell of the passive heat exchanger is connected with a firstcabin penetrating part and a second cabin penetrating part. The fresh water circulating pipeline is formed by a water tank, a fresh water pump, cooling users, valves and pipelines through connection.One end of the fresh water circulating pipeline is connected with the first cabin penetrating part, the other end of the fresh water circulating pipeline is connected with the second cabin penetrating part, and the fresh water circulating pipeline and the passive heat exchanger are combined to form a closed loop. The occupation of the space in the pressure-resistant cabin is reduced, the risk ofleakage of seawater pipelines is avoided, and the system energy consumption and the noise are reduced.
Owner:CHINA SHIP SCIENTIFIC RESEARCH CENTER (THE 702 INSTITUTE OF CHINA SHIPBUILDING INDUSTRY CORPORATION)

Social privacy protection method of multi-level attribute management center based on characteristic encryption

The invention provides a social privacy protection method of a multi-level attribute management center based on characteristic encryption. A friend making sponsor uploads encrypted personal information files to a remote friend finder, and a certain kind of user-defined attribute characteristics and a friend making access control strategy are uploaded to the multi-level attribute management center; the multi-level attribute management center generates ciphertext according to the attribute characteristics and is associated with an access strategy tree corresponding to attributes; a friend making requester requests for checking friend making information of other users in the friend finder, when an attribute set of the friend making requester is matched with the access strategy tree of the friend making sponsor, the multi-level attribute management center sends a secrete key corresponding to the attribute of the friend making sponsor to the friend making requester, and the friend making requester decrypts data ciphertext of an information owner of the friend finder. The method solves the single-point fault and performance bottleneck problems of a single-authorization center, and also solves the problems that an intelligent terminal does not depend on an authorization center and accordingly monitoring difficulty is high and application scenes are limited.
Owner:HUNAN UNIV OF SCI & ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products