Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

238results about How to "Avoid substitution" patented technology

Operation and maintenance safety auditing method and system

The invention discloses an operation and maintenance safety auditing method. The operation and maintenance safety auditing method comprises the following steps: receiving a login request sent by operation and maintenance personnel, and verifying the login request; if the verification is passed, obtaining and storing face image information of the operation and maintenance personnel in real time, and meanwhile recording an operation and maintenance operation on operation and maintenance target equipment in real time; verifying the identity of the operation and maintenance personnel in real time according to the face image information, and judging whether the operation and maintenance operation is an illegal operation; if the verification of the identity of the operation and maintenance personnel is wrong, and / or the operation and maintenance operation is the illegal operation, sending an alarm signal and / or interrupting the operation and maintenance operation; and carrying out correlation analysis on the face image information and the operation and maintenance operation, forming an operation and maintenance link, and carrying out audit according to the operation and maintenance link. Identity authentication can be carried out on the identity of the IT operation and maintenance personnel in an operation and maintenance personnel process, and the illegal operation and maintenance operation can be found in time. The invention further discloses an operation and maintenance safety auditing system.
Owner:STATE GRID CORP OF CHINA +2

Block-based method for scanning object code and replacing sensitive instruction

The invention discloses a block-based method for scanning object code and replacing sensitive instruction, aiming to provide a method of searching a minimum object code block which contains an sensitive instruction and is longer than JMP and using JMP to replace the minimum object code block when the sensitive instruction is shorter than JMP. The invention has the technical scheme that the method carries out dynamic scanning to a first scanning entry, wherein, the dynamic scanning mainly comprises basic block scanning for the initial boundary of a basic block and local sensitive instruction replacement for the sensitive instruction in a sensitive instruction queue to be transformed; the method executes GOS kernel code from the first scanning entry address until hardware interrupt or abnormal phenomena happens, or transforming code of an indirect control and transform instruction is executed; the entry address for GOS interrupt and abnormal exception handler or the destination address for indirectly controlling and transmitting instructions can be set as the first scanning entry address to circularly carry out the dynamic scanning. By adopting the block-based method, using INT0 / INT3 instruction for replacement can be avoided to the maximum extent, and the BT virtualization performance can be effectively improved.
Owner:NAT UNIV OF DEFENSE TECH

Team organizing video method, device and system used in team organizing game

The invention discloses a team organizing video method, a team organizing video device and a team organizing video system used in a team organizing game, aiming at reducing the waste of network resources and facilitating management. The team organizing video system used in the team organizing game comprises a game client terminal, a game server and a video server, wherein the game client terminal is used for sending a first video request to the game server, obtaining connecting port information of the video server selected by the game server, and sending a second video request to the video server according to the connecting port information; the second video request carries the queue identification of a user corresponding to the game client terminal; the game server is used for receiving the first video request of the game client terminal, obtaining the queue identification of the user corresponding to the game client terminal, and selecting the video server for the game client terminal according to the queue identification; and the video server is used for receiving the second video request sent by the game client terminal, and selecting a team processing module for the game client terminal according to the queue identification to process audio / video data of the game client terminal.
Owner:贵阳语玩科技有限公司

Nested strong loader apparatus and method

InactiveUS7383442B2Reduce probability being decipheredSufficient complexityMultiple keys/algorithms usageUser identity/authority verificationComputer moduleModularity
An apparatus and method provides one or more controlled, dynamically loaded, modular, cryptographic fillers. Fillers may be loaded by a single loader, multiple independent loaders, or nested loaders. Loaders may be adapted to load other loaders, within cryptographic controls extant and applicable thereto. Integration into a base executable having one or more slots, minimizes, controls, and links the interface between the fillers and base executables. The filler may itself operate recursively to load another filler in nested operations, whether or not the fillers are in nested relation to one another. An ability of any filler to be loaded may be controlled by the base executable verifying the integrity, authorization, or both for any filler. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy may limit each module function, access, and potential for modification or substitution. Dynamically loaded modules (loaders, other fillers, and submodules thereof), typically represent a relatively small portion of the overall coding required by the base executable, and may provide strong controls limiting integration by providing access that is nested, layered, or both between modules excluding direct access to or by them from the base executable or supported applications.
Owner:EMC IP HLDG CO LLC

Digital work ticket management and control system and method for power industry

PendingCN111091304ASolve electronic problemsAvoid time-consuming and laborious communicationOffice automationResourcesTicketControl system
The invention discloses a digital work ticket management and control system and method for the power industry. The system comprises a work ticket management and control subsystem which generates a work order according to a received maintenance task, generates a work ticket according to the work order, performs electronic signature and personnel qualification judgment on the work ticket to executeissuing and permission, sends an electronic signature verification and personnel qualification judgment request to a PMS subsystem, and synchronizes the work ticket to the PMS subsystem; the PMS subsystem calls a face library and face recognition judgment logic of the safety risk management and control subsystem; an electronic signature verification result is obtained, personnel qualification information of the safety risk management and control subsystem is called regularly, the electronic signature verification result and the personnel qualification information are sent to the work ticket management and control subsystem, and the work ticket is synchronized to the work ticket management and control subsystem; and the safety risk management and control subsystem is used for storing the face library, the face recognition judgment logic and the personnel qualification information, receiving the work ticket synchronized by the PMS subsystem for storage, and realizing integration with thePMS 2.0 system and the safety risk management and control platform.
Owner:金现代信息产业股份有限公司

Physical distribution piece tracking system based on GSM (Global System for Mobile Communications) and RFID (Radio Frequency Identification) technology

The invention relates to a physical distribution piece tracking system based on a GSM (Global System for Mobile Communications) and RFID (Radio Frequency Identification) technology. The physical distribution piece tracking system is characterized by comprising an information processing flow, a vehicular terminal information processing flow and a data processing center flow, wherein the information processing flow comprises the following steps that: a vehicular RFID antenna scans all label information of the vehicular goods and a handhold scanning gun scans single label information; all the label information of the vehicular goods scanned by the RFID antenna and the single label information scanned by the handhold scanning gun are transmitted to a processing center module; the processing center module sends the current information to a data center of the physical distribution company through the GSM technology; and the data center of the physical distribution company sends an instruction to the processing center module in remote and is communicated with an information platform inquiring terminal. The physical distribution piece tracking system has the following advantages that: the label information is sent back through the vehicular RFID; the drivers are prevented from leaving the pose, and replacing the goods; and during the vehicle transportation procedure, the system can timely alarm when the goods is accidentally lost.
Owner:SHANGHAI XINYE NETWORK TECH

Aircraft engine and mouse cage type bearing structure thereof

The invention provides a mouse cage type bearing structure. The mouse cage type bearing structure comprises a mouse cage body, a bearing and a regulating fixing part, wherein the inner part of the mouse cage body is provided with a bearing placing cavity and a regulating cavity; the bearing is arranged in the bearing placing cavity; the length, in the axial direction, of the bearing is smaller than that, in the axial direction, of the bearing placing cavity; the regulating fixing part can be axially and movably arranged in the regulating cavity; the regulating fixing part can regulate the position, in the bearing placing cavity, of the bearing, and fixes the bearing; the regulating fixing part regulates the position, in the bearing placing cavity, of the bearing, so that the axial positionof the bearing is adjustable, the distance from the bearing to the end part of the mouse cage body is changed, the problem that the bearing position is non-adjustable as the bearing and the mouse cage are integrated is effectively solved, and the rigidity of the mouse cage type bearing structure is conveniently changed. Meanwhile, the mouse cage body and the bearing are two parts, so that the cost can be reduced, and design and processing are convenient. The invention further provides the aircraft engine.
Owner:TSINGHUA UNIV

Detection system for detection of concrete test block and traceability anti-cheating method

The disclosure provides a detection system for detection of a concrete test block and a traceability anti-cheating method. The detection system is composed of a detection machine, an identity information acquisition device, an image acquisition device, and a processor. The front end of the image acquisition device is aligned at a direction of a concrete test block of the detection machine. The processor coupled to the detection machine, the identity information acquisition device, and the image acquisition device electrically performs the following control operations: the identity informationacquisition device determines an identity of a current test block; according to the identity of the current test block, a detection task related to the current test block is searched; after the detection machine carries out detection corresponding to the detection task on the current test block, a detection result is obtained; when mould breaking of the concrete test block is detected, the image acquisition device is controlled to obtain a mould breaking picture of the concrete test block; and the detection result, the mould breaking picture, and the identity of the current test block are associated and are stored. Therefore, the links with high cheating feasibility are reduced; the cheating cost is lowered; and the authenticity of the concrete detection is improved truly.
Owner:北京金科汇智科技有限公司 +1

Tracing and discriminating method for anti-counterfeiting information of vehicle component

The invention relates to a tracing and discriminating method for anti-counterfeiting information of a vehicle component. The method comprises the following steps that: a barcode intelligent terminal scans or inputs component barcode identifier information; the barcode intelligent terminal generates an XML-format file from the collected component barcode identifier information according to level binding relation, carries out encryption on the file to obtain a digital signature, and sends the digital signature to a vehicle information platform; the vehicle information platform queries whether the digital signature exists in the database of the vehicle information platform; if so, the component belongs to the original vehicle fittings; if not, the component does not belong to the original vehicle fittings; and the query result is fed back to the barcode intelligent terminal. According to the invention, authenticity identification and information query of the vehicle as well as the main components and parts of the vehicle for the consumers can be realized and thus the vehicle components can be prevented from being replaced; and a discriminating method for malicious claims beyond the warranty and the fraud of the vehicle with warranty can be provided.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

Encryption and decryption method for realizing safe video transmission of power monitoring system

The invention discloses an encryption method for realizing safe video transmission of a power monitoring system. The encryption method comprises the following steps: after establishing a secure connection between a first server and a second server, a video calling request is sent to the second server through a secure channel, and the second server uses a public key corresponding to the security device number in the video call request; the video calling request is processed based on an IBC method; consequently, ciphertext can be obtained, and the ciphertext is sent to the safety device corresponding to the safety device number; and the security device decrypts the ciphertext by using an encryption private key corresponding to the security device number to obtain a video call request, encrypts a random number in the video call request by using a signature private key corresponding to the security device number to obtain an encrypted random number, and sends the encrypted random number back to the second server. According to the invention, a security protection mechanism can be designed for the characteristics and security threats of the video monitoring system, so that the security and reliability of the video monitoring system are ensured.
Owner:湖南匡安网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products