Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

272results about How to "Eliminate security risks" patented technology

Method for distributing code stream encrypting and decrypting keys in SIP video monitoring system

The invention discloses a method for distributing code stream encrypting and decrypting keys in an SIP video monitoring system. In the method, in a process for calling a 3 pcc between code stream encrypting monitoring front end equipment and code stream decrypting customer premise equipment, or a process of calling a 3 pcc between the code stream encrypting monitoring front end equipment and a media server and a 3 pcc between code stream decrypting customer premise equipment and the media server, seeda, seedb and seedc, which are obtained by the monitoring front end equipment, the media server and the customer premise equipment in an identity authentication process during registration, are used as keys shared with an SIP server and identifiers, the content of an SIP signaling message bodySDP is expanded to carry the encrypting and decrypting keys, and a symmetric algorithm or asymmetric algorithm is used to guarantee the safety of the transmission of the encrypting and decrypting keys. The method has the advantages of generating different keys at each time of broadcasting, greatly improving safety coefficient, resisting replay attack and eliminating the safety hazards of the storage of the keys at multiple places.
Owner:THE FIRST RES INST OF MIN OF PUBLIC SECURITY +1

Heat pump air conditioning system, electric vehicle and control method thereof

ActiveCN108068577AAffect the mileage and other issuesRealize electric frequency conversion controlAir-treating devicesVehicle heating/cooling devicesEngineeringAir conditioning
The invention discloses a heat pump air conditioning system, an electric vehicle and a control method thereof. The heat pump air conditioning system comprises an enthalpy compressor (11), a first indoor heat exchanger (32), a flash evaporator (12) and an outdoor heat exchanger (31); an exhaust end of the enthalpy compressor (11) communicates with a refrigerant inlet of the first indoor heat exchanger (32); a refrigerant outlet of the first indoor heat exchanger (32) communicates with a first inlet and outlet end of the flash evaporator (12); a second inlet and outlet end of the flash evaporator (12) communicates with a first refrigerant inlet and outlet of the outdoor heat exchanger (31); a second refrigerant inlet and outlet of the outdoor heat exchanger (31) communicates with a suction end of the enthalpy compressor (11); and an air supply end of the flash evaporator (12) communicates with an air supply opening of the booster compressor (11). According to the scheme, the defects of large energy consumption, inconvenient operation and poor user experience in the prior art can be overcome, and the beneficial effects of small energy consumption, convenient operation and good user experience are achieved.
Owner:GREE ELECTRIC APPLIANCES INC

System and method for preventing misoperation in electric power system by using two-dimension codes

The invention relates to the field of a two-dimension code application system, in particular to a system and a method for preventing misoperation in an electric power system by using two-dimension codes. The method for preventing the misoperation in the electric power system by using the two-dimension codes sequentially comprises the following steps that: (1) a two-dimension code database is manufactured; (2) two-dimension code pictures are extracted and manufactured; (3) the two-dimension code pictures are pasted to corresponding positions of equipment; (4) a mobile operation order system is built; (5) an operation order is manufactured; (6) two-dimension code information of the equipment is implanted into relevant items of the operation order; (7) the operation order is pushed to a mobile terminal; and (8) mobile terminal equipment is used for scanning the two-dimension codes of the equipment. The system and the method provided by the invention have the advantages that the functionality is high; the operation by operators is convenient; great importance is realized on safety risk elimination, personal injury and equipment damage avoidance and safe operation guarantee; and the system and the method are suitable to be widely popularized and applied.
Owner:段君寨 +2

Fast testing instrument of variable ratio and polarity of current transformer and testing method thereof

The invention relates to a fast testing instrument of the variable ratio and the polarity of a current transformer and a testing method thereof. According to the invention, not only can the time for testing the variable ratio and the polarity of the current transformer be shortened from about 50min to about 25min, but also the invention has the advantages of small size, convenience in carrying, high in measuring accuracy, safety and reliability. The testing method comprises the following steps: the voltage outputted by a volt-ampere tester is inputted to a volt-ampere voltage input end of the tester, an exciting voltage U2 is outputted to a secondary coil of the current transformer by S1 and S2; a primary side of the current transformer is inputted to the input end of a primary voltage U1 of the testing instrument; volt and ampere are inputted to the output end of the exciting voltage U2, and then a small current transformer is connected in series and is used for monitoring volt-ampere current I; U2, I and U1 are respectively sampled by a corresponding range switching circuit, a corresponding buffering and amplifying circuit and an corresponding AD, and are transmitted to a CPU (Central Processing Unit) by optoelectronic isolation; the CPU measures amplitudes of three paths of signals; and the U2 and the U1 are also changed into square waves through a waveform converting circuit, the square waves are transmitted to the CPU through the opoelectronic isolation to be used for measuring the phase difference of the U2 and the U1, so as to judge the polarity of the current transformer.
Owner:HANGZHOU KAIDA ELECTRIC POWER CONSTR

Universal spiral compaction type grounding wire operating rod

PendingCN107275906ASolve the problem of difficult installation of ground wires at different anglesSolve installation difficultiesClip conductor connectionWire wrapping connectorsUniversal jointEngineering
The invention discloses a universal screw compression type grounding wire operating rod. The technical solution of the present invention is: including the wire clip assembly, the adjustment assembly, the operating rod assembly and the transmission handle assembly connected in sequence, the wire clip is provided with a screw connected with the universal joint and a screw compression bolt connected with the steel wire transmission flexible shaft The chuck, the adjustment assembly includes a support tube, which is used to fix the universal joint and the steel wire transmission flexible shaft, and is also provided with a plug-in joint and a limit stop nail for connecting the insulating operating rod. The operating rod assembly includes an insulating operating rod and an insulating operating rod. An insulated transmission rod inside the operation rod is connected with the steel wire transmission flexible shaft and the chuck of the transmission handle, and the transmission handle assembly is provided with a threaded connector for connecting the operation rod. The solution provided by the invention allows the wire clip to be adjusted at any angle at 360 degrees in the horizontal direction and about 120 degrees in the vertical direction, and the number of operating rods is reduced by the way of component connection, which facilitates the exchange of different types of wire clips and reduces the cost.
Owner:谭加新

Prevention and control optimization decision method based on offline strategy online check of security control system

The invention discloses a prevention and control optimization decision method based on offline strategy online check of a security control system. Firstly, according to the real-time status of the security control system and the offline policy model parameters, the on-duty strategy of each defended fault is identified; and then, aimed at the real-time status of the grid, security check is carriedout on each fault on-duty strategy, and the fault with transient or dynamic or static security and stability margin is used as a risk fault; after that, aimed at the real-time status of the grid, theminimum of the sum of the prevention and control cost and the emergency control cost of fault probability is taken as an objective function to calculate a prevention and control optimization decisionthat satisfies the security and stability requirements of the grid under all risk faults; the security check of other faults defended by the security control system is carried out for the prevention and control optimization decision, until, through iteration, all the faults defended by the security control system under the prevention and control optimization strategy meet the requirements of secure and stable operation of the grid after the faults, thereby avoiding the grid security risk of insufficient offline strategy control quantity or mismatch.
Owner:NARI TECH CO LTD +2

External slanted type steel box arch installing method

The invention discloses an external slanted type steel box arch installing method, which belongs to the technical field of the bridge construction. The external slanted type steel box arch installing method includes the following steps: an arch rib and an arch section are operated to complete turning to the side and turning over on the ground; after the arch section is lifted on a bracket at the top of a support, the fine adjustment of the accurate positioning of the arch section is performed through a trim holder arranged at the top of the support, a support top bracket and a jack; after the position of the arch section is adjusted in place, the temporary welding positioning measure is performed, and the arch section positioning and installing are completed. The optimized less support method according to the invention has the advantages that the posture adjusting process is performed on the ground, meanwhile, the arch section is accurately positioned though the trim holder, the support top bracket and the jack, the high altitude construction safety risk is eliminated, the quality control risk is lowered, the construction operation is convenient, the construction speed is fast, and the construction period can be saved about 30 days compared with the traditional less support method.
Owner:CHINA RAILWAY NO 2 ENG GRP CO LTD +1

Self-service double-gate customs clearance security inspection device and customs clearance security inspection method therefor

The invention relates to the technical field of customs clearance security inspection, and is a self-service double-gate customs clearance security inspection device and a customs clearance security inspection method therefor. The former comprises a control unit, a first gate machine, and a second gate machine. The first gate comprises a first gate machine portion and a first gate located behind the first gate machine portion, wherein a first protective baffle is disposed between the first gate machine portion and the first gate, and a forward intrusion detection unit is mounted on the inner side wall of the first protective baffle. The second gate machine comprises a second gate machine portion and a second gate, wherein second protective baffles are disposed between the second gate machine portion and the first gate, and between the second gate machine portion and the second gate, and a second information collecting unit is mounted on the gate machine portion, and a trailing detecting unit is mounted on the inner side wall of the second protective baffles. According to the self-service double-gate customs clearance security inspection device and the customs clearance security inspection method therefor, the problems of low efficiency and easy to cause false detection in the existing manual security inspection mode can be solved, which can effectively identify passengers and baggage, effectively reduce the false detection rate of the trailing detection, improve the efficiency of passing, identify the control personnel at the same time , and help eliminate security risks.
Owner:新疆民航凯亚信息网络有限责任公司

Paper money, coin and cash service device and method of internet payment (financial) account

The invention discloses a paper money, coin and cash service device of an Internet payment (financial) account; an instruction controller is respectively in two-way linkage with a WIFI module, a communication module, a Bluetooth module, an NFC module, a touch screen, a display and a cash box controller; the cash box controller is connected to a paper money module and a coin module; the device automatically generates cash service associated information; the cash service associated information is obtained by a hand-held terminal; a third party payment platform is logged in; identity authentication is carried out; a service interface is logged in; service is selected; after the device receives the selection instruction of the user by a private network, the display displays prompt information, the user operates according to the prompt; the third party payment platform keeps accounts and pushes operation amount of money and account balance, the user sends an ending request to the third party payment platform; the third party payment platform sends an ending instruction to the device; after finishing the service, the device generates new cash service associated information; convenient, high efficient and safe cash service is provided for various internet financial accounts.
Owner:王义海 +3

Security chip for protecting network security system and network security system using same

A security chip for protecting a network security system comprises a data security part for providing a secure encryption and decryption algorithm and an interaction protocol, wherein the data security part mainly comprises an encryption and decryption algorithm control engine, an authorization counter, a true random number generator, a unique serial number and a secure EEPROM; and a network security part composed of a network white list filtering module and a network data processing module. The encryption and decryption algorithm control engine comprises private key security storage for supporting private key ECDH operation and ECDSA signature authentication. The mainstream national password and commercial password encryption and decryption algorithms perform high-speed encryption and reduction on the data stream so as to adapt to the security requirements of different scenes. The chip safety management supplies power, manages the read-write ROM on the chip, allows special equipment to write, and allows remote erasure but does not allow reading. The invention also provides a network security system using the security chip. The sensitive data communication security can be protectedfrom the hardware level, and the efficiency can be greatly improved while the system security is improved.
Owner:XI AN JIAOTONG UNIV

Asymmetric FHE (Fully Homomorphic Encryption) method and secret key substitution and cipher text delivery methods thereof

The invention relates to an asymmetric FHE method and secret key substitution and cipher text delivery methods thereof. A private key and a public key are generated randomly, and the secret key is used to generate an operation support function, a unit cipher text of secret key encryption and a public key encryption operation support function; a plaintext is encrypted to generate a cipher text, namely, the secret key is used for encryption directly to obtain a direct cipher text, or the public key corresponding to the secret key is used to carry out encryption operation to obtain a compatible cipher text in the same secret key space; and when the cipher text needs to be delivered to the receiving end safely, the sending, receiving and server ends or the sending and receiving ends complete delivery of the cipher text. Operation of the cipher text is carried out directly without leakage of the plaintext, a safe data storage and operation environment is provided, the computing speed is improved substantially compared with the prior art, the required cipher text volume and expansion speed are lower, the methods can be realized in different manners, and a data owner can use different cloud computing services needless of worrying about leakage of sensitive and secrete data.
Owner:上海麟羿信息科技有限公司

Field debugging and maintenance method of street lamp on the basis of mobile terminal

The present invention discloses a field debugging and maintenance method of a street lamp on the basis of a mobile terminal. The mobile terminal is employed to query whether there is provided failure data of operation of city street lamp facilities or not, and the failure data is determined; the mobile terminal is employed to perform positioning of geographic locations of determined faulted city street lamp facilities, through adoption of the mobile terminal, the electricity in the control cabinets including the faulted city street lamp facilities is turned off and instruction issue is locked and the electricity in the control cabinets including the faulted city street lamp facilities is turned on and the instruction issue is unlocked after finishing changing or maintenance, and turning on the electricity is successful and the lock is unlocked according to the instruction feedback result; the street lamp facilities receive control instructions of normal operation, and the execution result data is uploaded to a monitoring center sever side; determination of states and faults is performed, and failure data is determined and screened out for query of the mobile terminal or pushing to the mobile terminal; and the steps above are repeated until there is no failure data. According to the invention, a safe, independent and quick debugging on site may be realized when street lamp facilities are operated and maintained.
Owner:TAIHUA WISDOM IND GRP CO LTD

Method for constructing firmware security detection of Internet of Things terminal equipment

The invention relates to the field of firmware package detection of internet-of-things terminal equipment, and provides a method for constructing firmware security detection of the internet-of-thingsterminal equipment in oder to overcome the defects of an existing security detection mode for a firmware package of the internet-of-things terminal equipment. The method comprises the following steps:step 1, collecting metadata of the internet-of-things terminal, and establishing a firmware list according to the metadata; establishing a firmware unpacking engine library, and establishing a mapping relationship between the firmware list and the firmware unpacking engine library; 2, obtaining a firmware package to be tested, extracting metadata, matching a corresponding firmware unpacking engine, and converting the firmware package to be tested into a machine language code; 3, converting the machine language code of the firmware package to be tested into an assembly language code; 4, scanning and detecting the assembly language code; 5, generating a detection report, wherein the metadata is multi-dimensional data. According to the invention, a basis is provided for reasonable planning of an Internet of Things operation and maintenance scheme, and possibility is provided for reducing the security risk of Internet of Things terminal equipment.
Owner:ELECTRIC POWER RES INST OF STATE GRID ZHEJIANG ELECTRIC POWER COMAPNY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products