Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

402results about How to "Avoid security risks" patented technology

Vulnerability management system based on multi-engine vulnerability scanning association analysis

ActiveCN108737425AMeet safety construction requirementsEfficient and accurate executionTransmissionVulnerability managementOperational system
The invention provides a vulnerability management system based on multi-engine vulnerability scanning association analysis. The vulnerability management system comprises: an asset detection managementmodule used for detecting asset information in a scanning network; a system vulnerability scanning module used for performing vulnerability scanning and analysis on a network device, an operating system, application service and a database according to the asset information, and supporting intelligent service identification; a Web vulnerability scanning module used for automatically parsing data according to the asset information, scanning the data, verifying a discovered WEB vulnerability, and recording a test data packet discovered by vulnerability scanning; a database security scanning module; a security baseline verification module; an industrial control vulnerability scanning module; an APP vulnerability scanning module; a WIFI security detection module; a report association analysismodule; and a whole-network distributed management module. The vulnerability management system provided by the invention can perform association analysis on a detection result and a compliance libraryof information security level protection to generate a level protection evaluation report that meets the specification requirements, and the security requirements of different customers are comprehensively met.
Owner:北京凌云信安科技有限公司

Construction method for soft rock deformation tunnel lining support dismantling-replacing arch

The invention provides a construction method for a soft rock deformation tunnel lining support dismantling-replacing arch. One-time whole section integral dismantling and replacing of a lining support is achieved. The construction method has the advantages that before dismantling and replacing, a lining which loses bearing capacity is subjected to grouting reinforcement treatment first, then a temporary cover arch is additionally arranged outside for reinforcement, and afterwards, the lining support is dismantled step by step, so that potential safety hazards caused by dismantling or removing of a temporary platform frame are avoided, and some security risks are avoided effectively. According to the construction method, the construction difficult problem of soft rock large deformation occurs during construction of a tunnel in special and complex geology is solved. Through the created novel construction method, the construction difficult problem of second lining cracking deformation needing remediation due to weak surrounding rock large deformation is solved. Through the construction method, safe, fast and economic treatment and remediation of the lining support and arch replacing construction are achieved, and the tunnel structure stability and construction safety are ensured effectively.
Owner:CCCC SECOND HIGHWAY ENG CO LTD

Vehicle safety control system and method for lane line detection temporary loss in automatic drive

InactiveCN106681318AImprove the ability to deal with special working conditionsAvoid security risksPosition/course control in two dimensionsVehiclesDriver/operatorImaging processing
The invention discloses a vehicle safety control system and method for lane line detection temporary loss in automatic drive, and the system comprises an automatic drive decision-making module, an image processing module, a light controller, an execution mechanism, an HMI module and a camera, wherein the image processing module, the light controller, the execution mechanism and the HMI module are respectively connected with the automatic drive decision-making module, and the camera is connected with the image processing module. The image processing module carries out the processing of an image, and carries out the detection of a lane line. The automatic drive decision-making module carries out the planning of a driving path of a vehicle based on the lane line, and controls the running of the vehicle. When the image processing module cannot detect the lane line, the automatic drive decision-making module obtains a passable region of a road according to a historical track of the vehicle and the information detected by a radar group, and controls the vehicle to reduce the speed and run in the passable region, and the light controller turns on an emergency light, and the HMI module continuously reminds a driver of taking charge of the vehicle. When the lane line cannot be detected in a short time, the system can guarantee that the vehicle is in a safety state, and guarantees the safety of the driver.
Owner:CHONGQING CHANGAN AUTOMOBILE CO LTD

Authentication method, authentication device and system applied to intelligent terminal

The invention provides an authentication method, an authentication device and a system applied to an intelligent terminal. The method includes the steps that an applied account number is bound with a public key of the authentication device which is carried along with a user; the intelligent terminal receives the verification request of at least one application, and the verification request requests that the signing message sent back by the authentication device is used for conducting verification; based on the verification request, the near-field communication function is used for sending the verification request message to the authentication device near the intelligent terminal by a certain distance; the authentication device uses a private key preset in the authentication device and a designated cryptographic algorithm to conduct signing on the verification message, and the signed verification request message is sent back to the application; the public key, bound in advance, of the authentication device and the designated cryptographic algorithm are used for verifying the verification request signing message which is sent back, and a verification result is obtained. By means of the authentication method, the authentication device and the system applied to the intelligent terminal, the problems of inadequate safety, complex operation and high cost in the application verification process in the prior art can be solved.
Owner:刘文清

Method for predicting corrosion lifetime of casing pipe

The invention discloses a method for predicting a corrosion lifetime of a casing pipe, which belongs to the field of corrosion protection of oil and gas well. The method is characterized by comprising the following steps: firstly performing corrosion test for casing pipe steel under a simulation working condition by utilizing a high-temperature high-pressure kettle, obtaining a uniform corrosion rate value, then obtaining an actual wall thickness of the casing pipe, and respectively solving remaining internal pressure strength and remaining collapse resisting strength of the casing pipe by utilizing the actual wall thickness of the casing pipe; and then calculating a remaining internal pressure resisting safety coefficient and a remaining collapse resisting strength safety coefficient of the casing pipe, respectively calculating an internal pressure resisting safety service lifetime and a collapse resisting safety service lifetime of the casing pipe according to a given internal pressure resisting safety coefficient threshold value and a collapse resisting safety threshold value, and finally obtaining a safety service lifetime of the casing pipe. The method has the advantages that the lifetime of the casing pipe can be reasonably predicted, and the safety risk caused by the corrosion of the oil and gas well casing pipe can be reduced or avoided.
Owner:SOUTHWEST PETROLEUM UNIV

Synchronization method and system for cross-application session information

ActiveCN103795767AAvoid the problem of sync login failureAvoid security risksTransmissionDomain nameClient-side
The embodiment of the invention provides a synchronization method and system for cross-application session information. The method includes: establishing a second-level domain name based on a root domain name of a first application for a second application and saving a corresponding relation of the second-level domain name and an original domain name of the second application on a second server; a first server saving first session information generated when a first application is logged in and a corresponding first session identification and generating first login information corresponding to the first application and sending the first login information to a client, wherein the first login information includes the root domain name of the first application and the first session identification; the second server receiving an access request for the second application and judging whether the access request carries a second session identification corresponding to the second application; if not so, extracting the first session identification from the first login information according to the stored corresponding relation of the second-level domain name and the original domain name of the second application; and searching for the saved first session information according to the extracted first session identification.
Owner:ALIBABA GRP HLDG LTD

Safety verification method and device for android application program

The invention relates to a safety verification method and device for an android application program. The safety verification method for the android application program comprises the steps that (1), a public key is extracted from a signed installation file of the android application program and stored in a service access end, and a public key extracted from a signed APK file is written as the first public key; (2), when the signed android application program is initialized, the service access end obtains the public key of the signed android application program, and the public key of the signed android application program is written as the second public key; (3), the service access end compares the second public key with the first public key, and whether the signed android application program is safe is judged according to the compared result. According to the safety verification method and device for the android application program, lawbreakers are effectively prevented from attacking a platform maliciously through counterfeit of an APK identity, the safety risk brought by the android application program falsified maliciously can be effectively prevented, and the safety of the platform is improved.
Owner:北京思特奇信息技术股份有限公司

Prevention and control optimization decision method based on offline strategy online check of security control system

The invention discloses a prevention and control optimization decision method based on offline strategy online check of a security control system. Firstly, according to the real-time status of the security control system and the offline policy model parameters, the on-duty strategy of each defended fault is identified; and then, aimed at the real-time status of the grid, security check is carriedout on each fault on-duty strategy, and the fault with transient or dynamic or static security and stability margin is used as a risk fault; after that, aimed at the real-time status of the grid, theminimum of the sum of the prevention and control cost and the emergency control cost of fault probability is taken as an objective function to calculate a prevention and control optimization decisionthat satisfies the security and stability requirements of the grid under all risk faults; the security check of other faults defended by the security control system is carried out for the prevention and control optimization decision, until, through iteration, all the faults defended by the security control system under the prevention and control optimization strategy meet the requirements of secure and stable operation of the grid after the faults, thereby avoiding the grid security risk of insufficient offline strategy control quantity or mismatch.
Owner:NARI TECH CO LTD +2

Method for sending permissions to users' accounts in enterprise information management system

The invention provides a method for sending permissions to users' accounts in an enterprise information management system. The method comprises following steps: setting basic permission properties of The invention provides a method for sending permissions to users' accounts in an enterprise information management system. The method comprises following steps: setting basic permission properties of users' accounts; generating basic permission codes of users' accounts based on basic permission properties; setting additional permission properties of users' accounts; generating additional permissiousers' accounts; generating basic permission codes of users' accounts based on basic permission properties; setting additional permission properties of users' accounts; generating additional permission codes of users' accounts based on additional permission properties; superposing additional permission codes to the basic permission properties in order to form total permission codes; and sending con codes of users' accounts based on additional permission properties; superposing additional permission codes to the basic permission properties in order to form total permission codes; and sending corresponding users' permissions to users' accounts based on total permission codes. By applying the method, flexibility of permission adjustments in the enterprise information management system can be rresponding users' permissions to users' accounts based on total permission codes. By applying the method, flexibility of permission adjustments in the enterprise information management system can be improved in order to avoid safety risks occurring in conventional permission adjustments.improved in order to avoid safety risks occurring in conventional permission adjustments.
Owner:BEIJING YUANXIN SCI & TECH

Electing method for side span overhang-middle span cable-stayed three-tower self-anchored type combination suspension bridge

The invention discloses an electing method for a side span overhang-middle span cable-stayed three-tower self-anchored type combination suspension bridge, which belongs to the erection field of the suspension bridge. In order to solve the problem of safety risk existing in the erection process of the existing side span overhang-middle span cable-stayed three-tower self-anchored type combination suspension bridge and in a temporary consolidation dismantling and horizontal force conversion process, the electing method comprises the following steps of: (1) forming a cable-stayed bridge of a middle tower and a girder suspended by a side tower; (2) closing the girder; (3) erecting a side tower cable lifting system; (4) dismantling a suspension section support; (5) adjusting a cable-stayed backstay, a suspension cable and a cable-stayed bridge; and (6) finishing the bridge. In the electing method, the construction working procedure of construction and dismantling of the temporary consolidation between the side tower and the girder is cancelled and the construction working procedure of ''side tower cable lifting system erection'' is carried out after all closure openings of are closed, thereby shortening the construction period, saving material consumption and cost of machinery one-shift and avoiding security caused by removing the temporary consolidation bearing strong horizontal force.
Owner:CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY

Metal foreign body detection device and method for wireless power transmission and wireless power transmission system

The invention discloses a metal foreign body detection device and method for wireless power transmission and a wireless power transmission system. The metal foreign body detection device comprises a plurality of signal acquisition coils arranged at the periphery of a transmitting coil, and is characterized in that the plurality of signal acquisition coils are arranged outside the transmitting coil in a pairwise manner along the radial direction of the transmitting coil, the two pairwise arranged signal acquisition coils are opposite in rotating direction, the plurality of signal acquisition coils are connected to a signal processing unit, and whether a metal foreign body exists or not in wireless power transmission is judged according to electromotive force signals of the two pairwise arranged signal acquisition coils. The metal foreign body detection device avoids a problem that a traditional metal detection coil located between a transmitting coil and a receiving coil affects the wireless power transmission efficiency of the system. In addition, the metal foreign body detection device also avoids a risk that a metal detection coil is caused to be too high in temperature because of a metal eddy current effect to result in potential safety hazards, and powerfully improves the safety of the system under the premise of ensuring the wireless power transmission efficiency.
Owner:HUNAN UNIV +1

Horizontal preassembling method of large-sized bridge steel tower

The invention relates to a horizontal preassembling method of a large-sized bridge steel tower. Tower sections are analyzed by utilizing finite elements, a reasonable supporting point position is found out, each tower section is supported and adjusted by adopting hydraulic pressure adjusting devices controlled by six computers, and the tower sections are transported into a preassembling factory building by adopting a beam transport platform wagon and then are put on a numerical control adjusting device; in order to achieve the beneficial effect of the self weight of the upper tower sections on the metal contact rate when bridge positions are installed, six pairs of counterforce racks are aggregately arranged on the two tower sections when being horizontally preassembled, numerical control penetrating oil cylinder boosting systems controlled by the six computers are distributed, the magnitude of each boosting is kept basically consistent, and the boosting sum approaches to the weight of the tower sections. The invention has the following advantages: (1) safe operation: the safety risk caused by long-section vertical type preassembling is effectively avoided; (2) high efficiency: because of smaller height of horizontal preassembling, the horizontal preassembling can be carried out in the factory building, and adjustment, alignment, interface splicing plate preparation and the like are all free from the influence of outdoor raining (snowing) and sunlight irradiation during preassembling, thereby being convenient to operate.
Owner:CHINA RAILWAY BAOJI BRIDGE GRP +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products