Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

693results about How to "Avoid storage" patented technology

Mobile terminal digital certificate electronic signature method

The invention relates to a mobile terminal digital certificate electronic signature method. According to the method, based on the characteristics of public keys and private keys and on the premise of not violating the rules prescribed by the electronic signature law, for example, a private key should be generated in a user terminal and should not leave the user terminal, a private key should not be transmitted via the network, and the like, a private key is discarded and locally and discretely stored after encryption, and the cloud uses strategies such as storing the public key and certificate to ensure that the private key is not locally cracked. In the transport layer, strategies such as double key and one-time pad are adopted to ensure that important information is not intercepted and decoded in network transmission. The identity of a certificate applicant is verified through the interface of an issuing bank, the user identity verification result of the bank counter is inherited, and therefore, remote online certificate issuing is realized in the system. The method not only can ensure that all the links of certificate applying, certificate issuing, certificate storing and certificate using are safe, but also can prevent hackers and Trojans from stealing certificate files, prevent network package-capture parsing, prevent password intercepting through screen capture and prevent an algorithm from being known through software decompiling.
Owner:BANKEYS TECH

A cross-domain authentication and fair audit deduplication cloud storage system based on a block chain

The invention belongs to the technical field of cloud computing, and discloses a cross-domain authentication and fair audit duplicate removal cloud storage system based on a block chain. The system comprises a cross-domain authentication module, a data encryption module, a ciphertext duplicate removal module, an integrity audit module and a server punishment module. In the authentication module, acloud user generates a certificate at a client in a self-signed mode, the certificate is stored in a block chain network after being verified by an authentication server, the user is verified to compare information such as the certificate and a block, and whether the certificate is valid or not is verified. According to the method, the problem of hierarchical query verification of a traditional PKI structure is avoided, the authentication frequency is greatly reduced, and the verification cost is reduced; By using an intelligent contract, a malicious server is punished to receive certain penalties and compensate users with impaired benefits under the condition that user data is damaged; And in the duplicate removal module, a data duplicate removal function is realized by using a convergence encryption technology, so that the cloud server is prevented from storing too much duplicate data, and the user and the cloud server are prevented from consuming a large amount of calculation expenditure and storage expenditure.
Owner:XIDIAN UNIV

Identity authentication method, device and system

The invention discloses an identity authentication method, device and system. The method includes the steps that legal authentication two-dimensional codes of authentication users are generated, face information of the authentication users is collected to generate legal face feature data of the users, legal personal mask codes of the authentication users are generated according to the legal face feature data, and the legal authentication two-dimensional codes and the legal personal mask codes are subjected to reversible operation to obtain encrypted two-dimensional codes; when the users are subjected to identity authentication, face information of the users is collected again to generate current face feature data, current personal mask codes are generated according to the current face feature data, the current personal mask codes and the encrypted two-dimensional codes are subjected to reversible operation to obtain two-dimensional codes to be authenticated, and whether the two-dimensional codes to be authenticated are consistent with the legal authentication two-dimensional codes is judged. The problem of user information leakage caused by storage of face recognition images is avoided, and the intensity and safety of identity authentication are improved.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Information pushing method and system and platform

The invention provides an information pushing technical scheme so as to solve the information pushing accuracy problem under the condition that enough historical data of a user to information preference lack. The information pushing method includes the following steps that two-dimensional code identifications are set at different geographic positions, and the two-dimensional code identifications correspond to the geographic positions where the identifications are set; a consulting terminal scans two-dimensional codes on the two-dimensional code identifications, identification information in the two-dimensional codes is analyzed, and the acquired identification information is sent to an information server; the information server receives the identification information, content information corresponding to the identification information is sent to the consulting terminal, and the content information is related to the geographic positions where the two-dimensional codes corresponding to the identification information are placed. According to the technical scheme, the tedious locating process of the geographic positions is avoided, storage processing of a large amount of geographic data information is also avoided, and configuration is flexible and convenient.
Owner:FUJIAN JIANKANGZHILU INFORMATION TECH CO LTD

VOC (volatile organic compound) waste gas treatment system

The invention discloses a VOC (volatile organic compound) waste gas treatment system. The VOC waste gas treatment system sequentially comprises a fan, a padding spray tower device, an ultraviolet activated carbon integrated device and a purified gas discharge opening, wherein the fan is connected with a VOC waste gas source; the padding spray tower device is connected with an air outlet of the fan; the ultraviolet activated carbon integrated device is connected to an air outlet of the padding spray tower device; the purified gas discharge opening is connected to the ultraviolet activated carbon integrated device. Waste gas is treated efficiently by the design of combining the padding spray tower with the ultraviolet activated carbon integrated purifier. Firstly, the padding spray tower is used for spraying washing; organic waste gas is dissolved into a purifying liquid well by multi-surface hollow spheres; then air water of a defogging layer is matched to share efficiently, so that gas after primary treatment is obtained by the padding spray tower. The gas after primary treatment is treated by the ultraviolet activated carbon integrated purifier, and clean gas reaching the standard is discharged out. The size of the device is reduced; the waste gas treatment efficiency is high; the purification cost is reduced; the purification standard reaching effect is ensured.
Owner:DONGGUAN CITY HUANSHUN ENVIRONMENTAL PROTECTION EQUIP IND

Data auditing and security deduplication cloud storage system and method based on block chain

The invention belongs to the technical field of cloud computing, and discloses a data auditing and security deduplication cloud storage system and method based on a block chain. The method comprises four processes of data security deduplication and auditing label generation, probabilistic integrity auditing, intelligent contract arbitration and data decryption. Before data outsourcing, enabling auser to encrypt data by adopting a convergence encryption technology and delete redundant data on a cloud server; verifying the integrity of the outsourcing data by adopting a probabilistic verification method; enabling the intelligent contract to automatically execute verification and fair arbitration of an integrity auditing result, punish the cloud server and compensate corresponding compensation money of the user when the integrity is damaged; and obtaining original plaintext data after the user downloads the data and carries out data decryption operation. The problem that arbitration cannot be automatically executed in traditional data auditing is solved. In addition, the method also supports a ciphertext data deduplication function for protecting the consistency of user data, so thata user can effectively obtain correct plaintext data after decryption is completed.
Owner:XIDIAN UNIV

In-situ preparation method of nanofiber antibacterial dressing

The invention discloses an in-situ preparation method of a nanofiber antibacterial dressing and belongs to the field of medical dressing. According to the method, a nanofiber antibacterial dressing containing a silver-supported nano particle is electrically spun directly on a wound surface by virtue of handheld electrostatic spinning equipment, wherein the high polymer material for electric spinning is a water-soluble or degradable biocompatibility material; the solvent is a medical solvent, and is safe and effective when directly sprayed on the wound surface; the used silver-supported nano particle is the nano particle with nano silver particles or silver ions adsorbed and loaded on the surface. By virtue of a doping manner, the antibacterial effect of the nano silver particles or silver ions is reserved; the problems of oxidation and agglomeration of silver nano particles are effectively overcome; the preparation method disclosed by the invention is simple and convenient to operate, is not limited by an operation site, and can be applied to acute trauma emergency treatment on various occasions; and the obtained dressing is stable in antibacterial property, does not need to be fixed extra, and is applicable to wound surfaces with various shapes, depths and sizes on different parts.
Owner:QINGDAO KANGYUAN JULI BIOTECH CO LTD

Broadband grid antenna array

The invention discloses a broadband grid antenna array. The broadband grid antenna array comprises a reflection floor and a plurality of radiating elements uprightly arranged on the reflection floor, wherein a plurality of micro strip transmission lines respectively connected with all the radiating elements are arranged on the upper layer of the reflection floor, the plurality of the radiating elements on the reflection floor form a grid antenna array in surrounding mode, radiation patches cover the obverse side and the reverse side of each radiating element, a section of each radiation patch, located on the lower portion of each of the obverse side and the reverse side of each radiating element, is corroded so as to expose a medium portion, metal slices are respectively pasted at the left end and the right end of each exposed medium portion, the metal slices are respectively connected with the radiation patches and the micro strip transmission lines, a plurality of via holes are formed in the periphery of each radiating element, and the plurality of the via holes penetrate through the radiation patches on the obverse sides and the reverse sides of each radiating element. The broadband grid antenna array is provided with a simple feed network, has the advantages of being large in bandwidth, easy to process, low in cost and the like, and can meet requirements of a broadband communication system.
Owner:SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products