Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51results about How to "Avoid unauthorized operations" patented technology

Secure smartphone-operated gun trigger lock

ActiveUS20140215881A1Prevent degradation of data storedPrevent data storedSafety arrangementIndividual entry/exit registersData transmissionData memory
A battery-powered trigger-locking device, which is configured to be disposed on a gun with a trigger for firing, includes a data receiver, a data memory and a logic device for determining whether data received by the receiver is the same, or substantially the same, as data stored in the memory. If a data match is indicated, the logic device causes an electromagnetic device to move a trigger-locking member to an unlocked position, permitting the gun to be fired. A separate electronic gun key is provided to transmit gun unlock data to the data receiver of the trigger-locking device. This gun unlock data may be a password, a long pseudo-random number or biologic data identifying the gun owner or some other person who is licensed or otherwise authorized to fire the gun.
Owner:MILDE KARL F JR

Login token generation and verification method and device and server

The embodiment of the invention is applicable to the technical field of information, and provides a login token generation and verification method and device and a server, and the login token generation method comprises the steps: receiving a login request submitted by a user through a browser, and verifying a user ID and a password contained in the login request; after verification succeeds, obtaining browser information and user information; splicing the user ID, the user information and the browser information into a key plaintext according to a predefined splicing mode and a predefined splicing sequence; generating an original data plaintext based on the user ID and preset token expiration time, and encrypting the original data plaintext by adopting a preset first encryption algorithmto obtain original data; encrypting the header, the original data and the key plaintext which are generated in advance by adopting a preset second encryption algorithm to obtain a dynamic key; and combining the header, the original data and the dynamic key into the login token, so that the security of the login token and the system is improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Patrol intelligent monitoring terminal and working method thereof

The invention discloses a patrol intelligent monitoring terminal and a working method thereof, and relates to the field of monitoring. The method comprises the following steps of verifying identity information of a user, and allowing the user to use after the verification is passed; acquiring wide-angle image monitoring information; extracting face information in the wide-angle image monitoring information, and comparing the extracted face information with target person information; and if the extracted face information is consistent with target person information, locking a target person through another zoom camera; and obtaining a use request of the user, and if the identity information passes the verification, allowing the user to use, thereby preventing a person without use permissionfrom influencing the use of the terminal. Wide-angle image monitoring information is obtained, the picture range is wide, a large range can be monitored, the extracted face information is compared with target person information, if the extracted face information is consistent with the target person information, another zoom camera is started to lock and monitor the target person, wide-area monitoring is guaranteed, and meanwhile target person monitoring is more targeted and comprehensive.
Owner:SHENZHEN WELL ELECTRIC

Constructor HSE integrated management system

The invention provides a constructor HSE integrated management system. The system comprises a personnel basic information real-time acquisition subsystem used for acquiring personnel basic informationand transmitting the acquired real-time information to a hydroelectric big database; a personnel construction equipment use permission automatic judgment subsystem used for construction equipment operation management; a personnel faint state automatic alarm subsystem used for automatically judging whether the personnel is in a faint state or not and giving an alarm; a personnel dangerous activityarea automatic recognition subsystem used for monitoring whether personnel enter a dangerous area or not and giving an early warning prompt; an import and export personnel information automatic recognition subsystem used for identifying and verifying import and export personnel information; and a safety personnel automatic deployment subsystem used for monitoring the distribution condition of thesafety personnel and carrying out safety management. Real-time information acquired by the personnel basic information real-time acquisition subsystem is used as a part of data basis for real-time analysis, so that the functions of the subsystems are realized. According to the system, full-automatic HSE comprehensive management of engineering construction field personnel is realized.
Owner:CHINA THREE GORGES PROJECTS DEV CO LTD

Permission access control method for alliance chain cross-chain

The invention discloses a permission access control method for alliance chain cross-chain. The method comprises the following steps: setting three types of user roles of an administrator, a common user and a supervision user in a cross-chain network; dividing according to user roles and setting permissions; enabling an authority management module to set authority control strategies for all operations in the cross-chain network; respectively setting corresponding permissions of the administrator, the common user and the supervision user according to the permission control strategy; setting an operation of the user management module or a mapping relation mode of an operation object and a user, and obtaining the identity of the user from the server session for judgment; setting operation of cards and order numbers, setting a server to perform unauthorized verification on object information used for business operation, verifying whether the information belongs to a current user, and if the verification is not passed, reporting an error so as to prevent the card numbers and order numbers of other people from being operated by tampering and unauthorized. According to the invention, role permission access control can be realized, so that the safety of cross-chain access is realized.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Authority assignment method for preschool education system

The invention relates to the technical field of terminal user authority control and particularly discloses a authority assignment method for a preschool education system. The authority assignment method comprises the following steps: (S1) sending a control request including a control model to a processing module by a teacher terminal; (S2) receiving the control request by the processing module, and acquiring corresponding authorization information from a defaulted authority list; (S3) acquiring the authorization information from the processing module by a student terminal, after operation information of a user is received by the student terminal, matching the operation information with the authorization information, if the operation information is successfully matched with the authorization information, carrying out the operation, and if the operation information is not successfully matched with the authorization information, omitting the operation; and (S4) sending a control ending request to the processing module by the teacher terminal, and after the control ending request is received by the processing module, releasing the authorization information of the student terminal. According to the technical scheme, the authority of the student terminal can be conveniently and effectively distributed.
Owner:重庆康普达科技有限公司

Fault detection circuit

The invention provides a fault detector which is used for detecting modification of internal data of an intelligent card by various external attacks in application of high safety performance intelligent cards and stimulating corresponding protection measures to ensure that the intelligent card works in the safe and reliable state.
Owner:HUADA SEMICON CO LTD

Data supervision system based on vehicle-mounted intelligent box and automated management system thereof

The invention discloses a data supervision system based on a vehicle-mounted intelligent box and an automated management system thereof. The data supervision system comprises intelligent boxes, anti-disassembly boxes, a GPS host, an extranet server and an intranet terminal, wherein the intelligent boxes respectively perform data interaction with the GPS host and the intranet terminal, the GPS hostperforms data interaction with the extranet server, the intelligent boxes perform data interaction with the intranet terminal, the intelligent boxes perform data interaction with the anti-disassemblyboxes, the intelligent boxes correspond to the anti-disassembly boxes one by one, the intelligent boxes are located in a cab of a vehicle, and the anti-disassembly boxes are installed on a carriage of the vehicle; and the automated management system at least comprises four process links that are initialization binding, task distribution, operation tracking and acceptance inspection. Thereby, thethree-party data of power plants, coal mine enterprises and transportation units can be docked and settled as a whole, management loopholes in the operation process of the vehicle can be prevented, the cargo conditions of the vehicle can be monitored in real time, and the management efficiency can be improved.
Owner:吴井礼

Dynamic minimized privilege access control method and device

The invention discloses a dynamic minimized privilege access control method and a dynamic minimized privilege access control device. The method comprises the following steps that different privilege access rules are distributed to corresponding privilege access users; after the user logs in, only the privileged account in the corresponding privileged access rule range can be seen, and only the privileged access in the privileged access rule range can be performed on the privileged account; commands or operations carried out in the privilege access process and seen data are judged whether to accord with privilege access rules or not by the dynamic permission execution module; if not, the privileged access operation of the user is intercepted, or the displayed data is shielded; and when an activity record inconsistent with the use track is generated, the privilege behavior analysis module defines the activity record as a threat, and the dynamic permission execution module judges whetherthe current privilege access operation needs to be intercepted or not according to the privilege access rule. According to the invention, related personnel can only carry out privileged access with the minimum permission matched with the personnel, and personnel unauthorized operation is effectively avoided.
Owner:广州海颐信息安全技术有限公司

Coding control method based on magnetic sensitivity and switch system

PendingCN110535456AEnsure safe operation of equipmentAvoid misoperation and unauthorized operationElectronic switchingMultifunction keys codingEmbedded systemInstruction code
The invention relates to a coding control method based on magnetic sensitivity and a switching system. Instruction codes of response signal combinations are set through different combinations of frequencies and / or durations of an external magnet entering a magnetic sensitive area, the single magnetic sensitive switch controls the equipment to execute various different operations, holes do not needto be formed in the equipment shell, the leakproofness of the equipment shell can be guaranteed to the maximum extent, and the switching system meets the operation requirements of electronic equipment in specific environments such as sandstorm, moisture or underwater.
Owner:CHINA GEOKON INSTR

NFC passive lock with key authentication function

The invention discloses an NFC passive lock with a key authentication function. The NFC passive lock comprises NFC intelligent equipment and a passive lock circuit. According to the NFC passive lock,through a unique double-sided spiral structure antenna, energy transmission efficiency is greatly improved, and sufficient energy is provided for reliable unlocking by a control circuit; through mutual matching between an energy coil and a tag coil, the energy coil and the tag coil both work in an optimal state, energy transmission and information transmission are performed simultaneously, and reliable control over unlocking is realized; by adding an energy storage circuit, charging cannot be performed unless a rectifying voltage is higher than a certain voltage, tag response is accelerated, and user experience is improved; moreover, key authentication is required for unlocking, unauthorized operation is eradicated, and the NFC passive lock is safer; by adding a sensor circuit, unlocking control and lock state uploading can be accurately performed; and by adopting a special driving circuit for unlocking, reliable unlocking is guaranteed, a background perception function is achieved, whether the lock on site is closed or not is discovered in time, and therefore the NFC passive lock has the advantages of being safe and reliable in unlocking, having a state uploading function and being simple in maintenance in a later period.
Owner:深圳市红芯微科技开发有限公司

Safety protection system of charging pile

The invention discloses a safety protection system of a charging pile. The system comprises a user registration module, a safety management module, a charging safety verification module, a charging process auditing module and a safety charging control module; the output end of the user registration module is electrically connected with the input end of the safety management module; and the outputend of the safety management module is electrically connected with the input end of the charging safety verification module. According to the safety protection system of the charging pile, the user registration module, the safety management module, the charging safety verification module and the charging process auditing module which are arranged can be matched to carry out operation protection ona mobile phone APP; and therefore, the malicious behaviors of the APP are monitored in real time, the problems of unauthorized operation and malicious stealing of sensitive information are effectively solved. The safety charging control module is used for carrying out safety protection on a situation in a charging process, so that harm caused by too high temperature generated by short circuit andoverload is effectively avoided, and the safety rights and interests of customers during charging are better protected.
Owner:浙江潮城科技发展有限公司

Combination device for lockout and partial stroke test of valve actuators

A combination device (102) configured to effect lockout and partial stroke testing for an actuator having a piston rod (104) providing linear motion and connected to a guide block (108) in an actuator, wherein the combination device includes a device housing (102a) having a housing bore, wherein the device housing is adapted to mount on a receptacle on the actuator that aligns a device housing bore coaxially to the translatory motion axis of the piston rod; an extension rod (109) adapted to be attached to the guide block connected to the piston rod; at least two slides or a profiled bore indexsleeve (106) disposed in the device housing that when engaged provide means of restraining the movement of the extension rod in a manner that prevents said extension rod from moving and, in use, a driver element of the actuator from rotating relative to an actuator housing; a housing cover mounted over the device housing wherein the housing cover protects and retains the extension rod, and the slides or the index sleeve in the device housing and a spring biased safety pin mounted on the housing cover wherein the spring biased safety pin is configured to prevent unintended actuation of the actuator; and a tubular cover to protect the extension rod.
Owner:BRAY INT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products