Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

189results about How to "Avoid security breaches" patented technology

Identity authentication system with biological characteristic recognition function and authentication method thereof

The invention relates to an identity authentication system with biological characteristic recognition function and an authentication method thereof. The system comprises a CPU main control unit (MCU), a system control unit, a hardware encryption and decryption unit, an on-chip memory with MPU protection function, an external communication unit, a man-machine interaction control unit, an external memory control unit, a PKI system and a sensor system, wherein the on-chip memory is used for realizing secure storage and access of such data as personal information, data, procedures, keys, system parameters, etc. The invention has the following beneficial effects: 1. solving the problem of security holes of pins of existing security products, radically solving the problem of authentication of personal identity and having high security; 2. guaranteeing the personal information of the user not to be cracked by logic attacks, side frequency attacks, physical attacks and other means through the hardware; 3. guaranteeing the personal information of the user to be securely stored and not to be cracked by splitting and photographing the chips and other means through the hardware; and 4. effectively avoiding the leak that the transaction information is tampered when the transaction information is sent to the personal identity authentication terminal.
Owner:HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD

System and method for realizing OTA upgrade of embedded hardware based on block chain

ActiveCN109889589AUpgrade does not affectImprove upgrade reliabilityUser identity/authority verificationData switching networksComputer networkFirmware version
The invention discloses a system and a method for realizing OTA upgrade of embedded hardware based on a block chain. The method comprises the following steps: constructing a P2P network topological structure comprising a plurality of service nodes downloaded by firmware; taking one service node as a first block node, and converting other service nodes in the P2P network into one block node on theblock chain one by one through a block chain consensus verification mechanism; storing the latest firmware software on the service node, and calculating the node content by using a Hash algorithm to obtain a Hash value of the service node; wherein the node content comprises feature information of the service node and firmware software stored on the service node; and the intelligent terminal downloads the corresponding hash value from the service node of the P2P network, carries out firmware version security verification according to the hash value, downloads and stores the verified firmware software, and upgrades the firmware software. The safe and credible P2P network topological structure is established by using the block chain technology, and the OTA upgrading reliability and safety ofthe intelligent terminal are improved.
Owner:IGRS ENG LAB

A coding and preparation method for the multiple cross-validation of RFID compounding labels and its system

The invention relates to a method for encoding and manufacturing a multi-interactive authentication RFID compound intelligent tag, as well as a system thereof. An EPC product electronic code which is provided with a time code and is randomly corresponding to a sequence code is prepared as a storage code of a non-chip RFID, a surface acoustic wave RFID or a powder RFID chip; the code is converted to a plaintext code via encryption and is printed on a tag for covering; the plaintext code is converted to a bar code and printed on the tag; a digital safe line production tag is used to carry out the pre-chopping treatment of the tag, so as to prevent the transfer; numbers on the safe line are identified by photography; EPC codes, passwords, bar codes and the safe line digital codes are stored correspondingly; a tag anti-counterfeit system, a bar code scanning system and a radio frequency identification system are all connected with the Internet of Things; thus the same product information and logistics path information can be accessed through the EPC Internet of Things regardless of using radio frequency identification, man-made identification or machine identification. The invention can greatly reduce the tag cost, improve the safety, and expand the information redundancy and the application adaptability.
Owner:SICHUAN ZHENGDAOTIANHE INFORMATION TECH

Embedding and extracting method for audio zero water mark based on vector quantization of coefficient of mixed domain

An audio zero watermark embedding and extraction method is based on mixed domain coefficient vector quantization in an audio processing method in the information security technical field. The watermark embedding part of the method is as follows: segmenting processing of an original audio signal is carried out; discrete wavelet transformation of each segment of audio frequency is carried out to extract a wavelet approximate component; discrete cosine transform and vector quantization of the obtained wavelet approximate component are carried out; a polarity vector is constructed according to the statistic characteristics of an index value after vector quantization; and through carrying out XOR operation of the polarity vector and a to-be-embedded original watermark signal, a watermark is embedded in a detection cipher key. The watermark extraction part of the method is as follows: firstly, a polarity vector is obtained from a to-be-measured audio signal through adopting a method identical to that of the watermark embedding part; then, XOR operation of the polarity vector and a watermark detection cipher key is carried out to obtain an extracted watermark signal. The audio zero watermark embedding and extraction method shows stronger robustness to various normal audio signal processing operations and malicious attacks, and also omits the trouble of reconstructing an audio carrier signal.
Owner:上海交通大学无锡研究院

Computer system of bottom identity identification and method therefor

A computer system and method for the bottom identity authentication, it contains the trigger unit for the identity authentication of the users of EFI (21), The identification unit of the identity of the users of EFI (22), the certification unit of the identity of the users of EFI (23), and the management unit of the safety for the EFI. The trigger unit for the identity authentication of the users of EFI (21) will be started after the users has started the computer system and finished the initialization of the platform. It will judge the safe grade of the computer system and enter directly the start of the operation system or execute the next step according to the safe grade assigned. It will remind the users to execute the identity authentication, and the users must input information. And then the identification unit of the identity of the users of EFI (22) will be started to obtain the identification information of the users. The certification unit of the identity of the users of EFI (23) will be activated to verify the legitimacy of the identity information of the user. The operation system will be started if the users is legitimate, otherwise, the operation of the user will be refused and not to start the operation system. The method is easy and useful, and has some advantages, such as the supporting function and the applicability of it are very strong.
Owner:LENOVO (BEIJING) CO LTD

Ship unloading and loading control system and related system and device

The invention discloses a shipping unloading and loading control system and related systems and devices, which can achieve full automation of ship loading and unloading; The ship unloading control system comprises the dispatching center system generates a ship unloading plan according to the ship information of the target ship, the container information and the shore crane equipment information, generates a ship unloading task and a ship berthing task according to the ship unloading plan, and sends the ship berthing task and the ship unloading task to a ship control system of the target ship and a shore crane control system of the target shore crane equipment respectively; The ship control system sends ship information and container information to the dispatching center system, controls atarget ship to run to an operation area corresponding to the target shore crane equipment according to the received ship berthing task, and sends a ship in-place notification message to a shore cranecontrol system of the target shore crane equipment; And when the shore crane control system receives the ship in-place notification message from the ship control system, the shore crane control systemcontrols the target shore crane equipment to load the container on the target ship to the vehicle according to the ship unloading task.
Owner:BEIJING TUSEN ZHITU TECH CO LTD

Method for realizing access layer security, user equipment, and small radio access network node

The invention discloses a method for realizing access layer security, user equipment, and a small radio access network node. The method comprises: end-to-end user plane access layer security between user equipment (UE) and a gateway node is executed; and when a micro-communication path exists at the UE, end-to-end control plane access layer security between the UE and an initial access node is executed; and or when a micro-communication path and a macro-communication path exist at the UE, end-to-end control plane access layer security between the UE and a macro eNB in the macro-communication path is executed. The micro-communication path is a communication path in which the UE is connected to a small radio access network node by a radio access link and then is connected to a core network and the macro-communication path is a communication path in which the UE is connected to the macro eNB by a radio access link and then is connected to a core network. Because the user plane security is only executed in an end-to-end mode between the UE and the gateway, the user plane security is guaranteed well; and the control plane security is only executed in an end-to-end mode between the UE and the initial access node or the macro eNB, so that the time delay of the control plane security operation is reduced on the premise that the control plane security is guaranteed. Meanwhile, the mobility performance of the UE is improved; and continuity of user plane data transmission of the UE is guaranteed.
Owner:ZTE CORP

Chip-free quasi RFID multiple verification low cost encrypted EPC composite label and system

The invention relates to a chipless quasi-RFID multi-verification low-cost encrypted EPC compound label coding method, a manufacturing method and a structure, as well as a computer management system. An EPC product electronic code which is provided with a random encryption code and is randomly corresponding to a sequence code is compiled, a plain-text password which is converted by encryption is printed on a label for covering, the plain-text password is then converted to a bar code to be printed on the label, a digital safety line is used for producing the label, the label is carried out the pre-chopping treatment to prevent the transfer, digits on the safety line are shot and identified, the random encryption EPC code, the plain-text password, the bar code and the digits of the safety line are stored correspondingly, a label anti-counterfeiting inquiry system and a bar code scanning system are both connected with an EPC network, the same product information and the logistics path information can be obtained by the EPC network regardless of artificial recognition and machine identification. The label cost is greatly reduced, the safety is improved, the information redundancy and the application adaptability are expanded, and the seamless connection is updated to RFID labels with other recording forms.
Owner:SICHUAN ZHENGDAOTIANHE INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products