Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

114results about How to "Confidential" patented technology

Remote and hierarchical accurate follow-up visit management system for chronic cardiovascular diseases

InactiveCN107169270AConvenient digital health care servicesReliable digital health care servicesSpecial data processing applicationsCommunity orThe Internet
The invention relates to a remote and hierarchical accurate follow-up visit management system for chronic cardiovascular diseases, in particular to remote and accurate follow-up visit of various hospitals, communities or even family members for high-risk patients subjected to mechanotherapy or intervention operations of chronic cardiac failure, auricular fibrillation and cardiovascular diseases. The system comprises a health cloud server, a hierarchical diagnosis and treatment management system and application terminal equipment; multi-permission is set on a client and a server; the system is linked through WiFi (Wireless Fidelity) and / or a network; the health cloud server is provided with a data import function, an information collection function and a data statistic function; and a hierarchical health management platform is constructed. The system can carry out real-time health monitoring, assessment, consultation and diagnosis and treatment at any time and any place on health conditions of chronic disease patients, especially chronic cardiovascular disease patients, provides convenient, reliable, considerate and inexpensive digital health care services and lays a foundation for establishment of an internet hospital.
Owner:NORTHERN JIANGSU PEOPLES HOSPITAL

Certificateless multi-receiver signcryption method with multivariate-based cryptosystem

The invention discloses a certificateless multi-receiver signcryption method with a multivariate-based cryptosystem. The certificateless multi-receiver signcryption method is used for solving the technical problem of poor security of an existing certificateless signcryption method. The technical scheme includes that the method includes: firstly, using a key generation center to generate system parameters, and selecting a secure multivariable encryption algorithm to generate keys; and enabling a user U to obtain system private keys of the key generation center and generate the private keys to user keys prior to that a user Alice with the identity IDA sends signcryption messages to a user group L={ID1, ID2,...,IDt}, and accepting or refusing ciphertext sigma by means of un-signcryption. By the aid of the multivariate-based cryptosystem, high security of anti-quantum computation is achieved, and the certificateless multi-receiver signcryption method is still high in security facing attack of a quantum computer. Compared with the background art, the certificateless multi-receiver signcryption method is small in computation and high in security, has the advantages of completeness, confidentiality, unforgeability, forward security, backward security, receiver privacy protection and the like and is capable of resisting existing known attack.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Performance assessment managing method

The invention relates to the field of intelligent management and discloses a performance assessment managing method, adopting a server and at least one client computer, which are connected through Internet or a local area network. The performance assessment managing method comprises the working steps of: step (1), modeling; step (2), inputting information; step (3), requiring assessment; step (4), assessing and analyzing; and step (5), assessing and feeding back. According to the performance assessment managing method, an assessor (manager) can conveniently and rapidly set self-help performance assessment index and rule in a system definition format on any computer terminal based on the Internet, and also can carry out inquiring and operation; and an assessed person can conveniently and rapidly obtain self assessment information from any computer based on the Internet and carries out operation. The method disclosed by the invention is carried out based on the Internet and is not limited by time and space, so that the time and the cost of two parties are extremely saved, and the performance assessment managing method is extremely easy to operate and has certain confidentiality; and therefore, the performance assessment managing method is a helpful tool for carrying out the performance assessment by enterprises and is extremely good for popularizing and using in performance assessment managing work.
Owner:SHENZHEN HALIS IOT TECH

Three-factor identity authentication and key negotiation method in multi-server environment

The invention discloses a three-factor identity authentication and key negotiation method in a multi-server environment. The method comprises the following phases: a registration center initializationphase, a server registration phase, a client registration phase and an authentication and key negotiation phase, and a functional portion of client password replacement. By adoption of the three-factor identity authentication and key negotiation method disclosed by the invention, the participation of a trusted third party registration/authentication center is not required in the authentication phase, thus reducing the communication steps and costs, improving the protocol operation efficiency and ensuring the security of the protocol at the same time. The mutual authentication of the two parties is realized by a static DH value shared by the client and the server uniquely, and the confidentiality of a session key is realized by a dynamic DH value shared by both parties uniquely and used for calculating the session key so as to ensure the security of an established channel. The three-factor identity authentication and key negotiation method disclosed by the invention has authenticationproperty and confidentiality, is secure and provides an efficient multi-server three-factor identity authentication and key negotiation protocol on the communication.
Owner:HANGZHOU NORMAL UNIVERSITY

Device for configuring multimedia acquisition devices by using multimedia

The invention relates to the technical field of customization of multimedia acquisition devices and discloses a device for configuring multimedia acquisition devices by using multimedia. The method comprises the following steps that: firstly, software is installed on configuration device is operated firstly, and the software automatically encodes configuration information into a picture, a video or an audio on the configuration device according to the information input by a user or information automatically detected by the software or the information automatically detected by configured equipment and acquired by the software; then, the picture, the video or the audio are outputted to the configured device; and finally, the configured device decodes an inputted picture or video or audio, and carries out automatic configuration according to the configuration information obtained through decoding. According to the invention, the configured device and the configuration device are not required to be provided with other specialized communication interface devices, and the transmission of configuration information is implemented by using existing indispensable s image or voice inputting/outputting devices on the two devices, thereby reducing the number of devices on the configured device, and reducing the manufacturing cost of the device.
Owner:深圳市天和荣科技有限公司

Time modulation array based communication and radar integrated design method

A time modulation array based communication and radar integrated design method is provided. The invention relates to a communication and radar integrated design method. The invention solves the problem that the existing integrated waveform design methods have high complexity, the time division based integrated methods are low in efficiency, the reliability of the space division based integrated methods are low, and scanning detection cannot be performed. The invention comprises: 1, calculating and obtaining an amplitude of a nth array element weighted value; 2, periodically modulating a uniform linear array, and obtaining an array factor of a fundamental component of a time modulation array and an array factor of the time modulation array +a first harmonic component; 3, calculating a phaseof the nth array element weighted value; 4, calculating the turn-on time and the turn-off time of each array element RF switch; and 5, mixing and sending a radar signal and a communication signal tothe time modulation array in the transmit mode; simultaneously receiving the radar signal and the communication signal in the receiving mode, and using a band pass filter to perform distinguishing. The invention is used in the field of communication and radar integration.
Owner:HARBIN INST OF TECH

WiFi-based intelligent electronic name card system and operation method

The invention relates to technologies of intelligent electronic name cards and specifically relates to a WiFi-based intelligent electronic name card system and an operation method. The intelligent electronic name card system comprises an upper computer management system, an electronic name card terminal system and a loudspeaker system, wherein the upper computer management system, the electronic name card terminal system and the loudspeaker system are connected in a wireless manner; the upper computer management system is used for intelligent ranking, electronic name card display, voting management, microphone management, system setting and WiFi communication; the electronic name card terminal system is used for the electronic name card display, voting input, microphone input and the WiFi communication; and the loudspeaker system is used receive digital voice signals and convert the signals into analog signal amplified output and the WiFi communication. The intelligent electronic name card system can cope with emergencies, is highly flexible and saves a lot of human resources; additional microphones do not need to be installed, and a voting function avoids injustice brought by manual vote statistics; and a wireless communication manner is used, so complicated equipment and wiring are avoided, so a meeting place becomes concise and efficient.
Owner:HUBEI UNIV OF ARTS & SCI

Civil air defense emergency alert information message compression encoding method based on Beidou communication functions

The invention provides a civil air defense emergency alert information message compression encoding method based on Beidou communication functions. The method comprises: a civil air defense common word code library is built; words included in the code library are expressed with corresponding codes and the codes are encapsulated into subframes; characters not included in the code library are expressed with corresponding computer codes; the computer codes and the subframes are connected according to the order of the original message to form a message text, and a message header and a message tail are added to the message text to form a to-be-sent message; it is determined if the length of the to-be-sent message is greater than the maximum length, L bytes, permitted by the Beidou system, and if so, the to-be-sent message is segmented into a plurality of sub-messages, the length of which is no greater than L bytes, for sending, each sub-message having a message header and a message tail; otherwise, the to-be-sent message is sent directly. The method can reduce the length of the message and the sending times of a long message. The alert information notifying time is shortened, and the flow is saved. The method is simple and easy to implement with good reliability.
Owner:ELECTRONICS ENG COLLEGE PLA

Underwater enhanced positioning method based on acoustic measurement error correlation

The invention belongs to the field of underwater navigation positioning, and specifically relates to an underwater enhanced positioning method based on acoustic measurement error correlation. The underwater enhanced positioning method includes following steps. An underwater navigation transceiver is used to send an acoustic positioning request signal to a smart buoy positioning hydrophone and an underwater reference station through a broadcasting means. Each smart buoy in a referential network, after obtaining a positioning request of an underwater user, conducts overwater difference positioning by simultaneously receiving GNSS satellite signals and the difference correction information of a difference base station, to obtain accurate position coordinate and buoy synchronous time. A data processing module integrated in each smart buoy conducts acoustic encoding and modulating for the position of the data processing module and sending time. The underwater base station receives buoy acoustic positioning signals synchronous with an underwater user, and an acoustical signal spatial correlation error item extracted by the underwater base station serves as acoustical signal propagation difference information. The precision of acoustic measurement signals is improved, advantages in security is ensured, and underwater positioning precision is genuinely improved.
Owner:HARBIN ENG UNIV

Intelligent home system and authentication connection method on the basis of sound wave authentication connection

InactiveCN105591755AGuaranteed confidentialityEnsure the confidentiality of the sound wave transmission processUser identity/authority verificationConnection managementNetwork terminationAcoustic wave
The invention belongs to the technical field of wireless communication and especially relates to an intelligent home system and an authentication connection method on the basis of sound wave authentication connection. The intelligent home system on the basis of sound wave authentication connection comprises an intelligent home dwelling house which is provided with multiple intelligent home devices. It is characterized in that the intelligent home dwelling house is provided with a sound wave sending device which is used for sending sound wave to the intelligent home devices; the intelligent home dwelling house is provided with an intelligent home network terminal which is used for providing access for the intelligent home devices. The beneficial effects of the invention are: all the intelligent home devices can be simultaneously authenticated and connected to the intelligent home network terminal; devices outside the cannot acquire sound wave signals so that the sound wave transmission process is confidential and error-connection of devices outside the dwelling house will not happen; the system and method have low cost, easy operation, high efficiency, and safe and reliable authentication means.
Owner:JINAN JOVISION TECH CO LTD

Storage cabinet, control system and data storage system

The invention provides a storage cabinet, a control system an d a data storage system. The data storage system comprises the control system and at least one storage cabinet body; each storage cabinet body comprises a command receiver, an electronic control mechanical lock and multiple cabinet bodies, the electronic control mechanical lock is installed in the cabinet bodies, and one end of the command receiver is used for receiving switch control instructions from a computer and controlling the electronic control mechanical lock according to the instructions; the control system of the storage cabinet bodies comprises a data storage module, a data searching module, a data browsing module, a personal data access module and a setting module. By the arrangement, information index sharing is realized through the control system of the storage cabinet bodies, tedious process in data searching among apartments is avoided, problems about storage disorder and borrowed record disorder can be solved, the storage cabinet bodies have confidentiality, thievery prevention and security functions, information record of the control system is detailed, and convenience and rapidness in searching and storing process of various archive information can be achieved.
Owner:STATE GRID SHANDONG ELECTRIC POWER +1

Fluid regulation type internal insulation structure and its prefabricated method

The invention disclose is wall inner heat preservation structure for building, especially a fluid adjusting type inner heat preservation structure with multifunction for external heat preservation and inner thermoregulation and the making method, which includes a heat emission layer, a diversity water type plastic tubing net and an insulation layer, wherein, the diversity water type plastic tubing net comprises two main tubes and a plurality of capillaries vertical coupling to the two main tubes with two ports communicated with the external heating or refrigerating system, characterized in that, the heat dissipation layer is composed of a double-layer thermal fin, and a plurality of capillaries is clamped between the double-layer thermal fin; wherein the space between the plurality of capillaries and the thermal fin coating the two sides is compactly sticked without air obstruct. One side of the insulation layer is sticked with the outside surface of the thermal fin, and the other side is connected with the wall, which has light weight, thin thickness, even thermolysis, no noise, marked energy saving effect, and not only is suitable for the installation of the new building wall, but also for the heat preservation energy saving reconstruct of the old building, and easy to extend and actualize.
Owner:朱江卫

Method and device for starting processor as well as device for providing IPL (Initial Program Loader)

The embodiment of the invention discloses a method and device for starting a processor as well as a device for providing an IPL (Initial Program Loader), so as to solve the problem that loading and executing any IPL can have influence on the system safety when a processor starts. The method comprises the following steps: the processor reads a public key, generated by a provider, of an SBH (Security Boot Header) in the preloading IPL, and generates a second public key digest hash corresponding to the public key; when the second public key digest hash is identical with a first public key digest hash, the digest encrypted message in the SBH is decrypted through the public key to obtain a first IPL digest hash; a second IPL digest hash of program codes in the preloading IPL is generated; when the first IPL digest hash is identical with the second IPL digest hash, the preloading IPL is executed to start the processor. According to the embodiment of the invention, the two comparison processes, namely the comparison of the public key digest hashes and the comparison of the IPL digest hashes, are performed in the starting of the processor, so that the system safety is improved as the number of comparison processes is increased.
Owner:新奇点智能科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products