Patents
Literature

4534results about How to "Ensure safety" patented technology

Transaction verification method and system based on block chain

ActiveCN106548330APrevent balance leakageEnsure safetyPayment protocolsPayment circuitsVerification systemComposite number
The invention discloses a transaction verification method and system based on a block chain. The method comprises the following steps: when a node on the block chain processes a transaction with a transaction type and a transaction amount, decrypting an original balance of each transaction side through first decryption parameters sent through the transaction sides, obtaining new balances by calculating each original balance, obtaining encrypted new balances by encrypting the new balances through encryption parameters sent by the transaction sides, and broadcasting each encrypted new balance on each node of the block chain; when the node of the block chain receives the broadcast encrypted new balance of each transaction side, starting an intelligent contract to perform composite number verification; if the composite number verification succeeds, performing updating based on each corresponding encrypted new balance; and invoking an external negative balance verification system to perform negative balance examination on each account balance, and if the negative balance examination succeeds, determining that transaction verification succeeds. According to the invention, whether the transaction is normal can be verified, and the transaction processing speed on the block chain can also be guaranteed under the condition that the system overhead is not occupied.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Method for realizing the intelligent tour-inspection of power tower based on miniature multi-rotor unmanned helicopter

The invention discloses a method for realizing the intelligent tour-inspection of a power tower based on a miniature multi-rotor unmanned helicopter, and belongs to the technical field of tour-inspection of transmission lines. The method comprises the following steps of: tower modeling, inspection viewpoint planning, autonomous navigation, data acquisition and failure analysis, wherein the tower modeling step comprises a data acquisition process, a tower positioning process, a security zone division process and a security zone evaluation process; the inspection viewpoint planning step refers to a process of solving an optimal observation viewpoint according to related constraint conditions; the autonomous navigation step comprises a basic navigation sub-step and an accurate navigation sub-step; the data acquisition step refers to a process of transmitting related data back to a ground station by using the miniature multi-rotor unmanned helicopter; and the failure analysis step refers to a process of performing analysis, judgment and diagnosis according to the data transmitted back to the ground station by tour-inspection and decision making personnel. The method has the advantages of high safety, detection accuracy, tour-inspection efficiency and flexibility, low cost and high operability.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Composite coating electromagnetic shielding paint and composite coating electromagnetic shielding material prepared therefrom

The invention relates to the field of electromagnetic wave shielding, in particular to a composite coating electromagnetic shielding paint and a composite coating electromagnetic shielding material prepared therefrom. The composite coating electromagnetic shielding paint comprises a conducting layer paint with a reflection function and a wave-absorbing layer paint with an absorption function, wherein the reflecting layer paint comprises the components of polymer emulsion, a conducting filler, a coupling agent, a defoaming agent, a wetting agent, a film forming assistant, a thickening agent and water; and the wave-absorbing layer paint comprises the components of polymer emulsion, a wave-absorbing filler, a coupling agent, a defoaming agent, a wetting agent, a film forming assistant, a thickening agent and water. The invention also discloses a composite coating electromagnetic shielding material prepared by coating the paint. The material is prepared by the steps of firstly coating the conducting layer paint on the surface of a base material, drying, then coating the wave-absorbing layer paint and the like. In the invention, the electromagnetic shielding material prepared by using the mode of compounding the wave-absorbing layer with the reflecting layer effectively reduces secondary pollution caused by the reflection of electromagnetic radiation and has wider shielding wave band in comparison to a pure wave absorbing coating; and the use of water emulsion reduces the production of harmful volatile matters and guarantees body safety.
Owner:ARMY MEDICAL UNIV +1

High-accuracy target positioning method of unmanned plane on basis of multi-station measurement

The invention discloses a high-accuracy target positioning method of an unmanned plane on the basis of multi-station measurement. The high-accuracy target positioning method comprises the following steps: determining a satellite receiver, an inertial measurement unit, a camera holder and a camera equipped on the unmanned plane; before the unmanned plane takes off, calibrating inner parameters of the camera; in the flying of the unmanned plane, selecting interesting target points, and adjusting the azimuth angle and the elevation angle of the camera holder to guarantee that the target points are in the viewing field in the set time; extracting out coordinates of homonymy points of targets in images shot at different times, and calculating the coordinates (X, Y, Z) of the target points in a world coordinate system; converting the (X, Y, Z) into longitude and latitude and geodetic height and finishing the target positioning process. The high-accuracy target positioning method disclosed by the invention has the advantages that a photoelectric reconnaissanle platform is not needed, and laser ranging is not needed, so that the self safety is effectively guaranteed, and the cost of measuring equipment is also reduced; simultaneously, the high-accuracy target positioning method has high positioning accuracy and wide application range, and has important practical significance in the field of high-accuracy target positioning of the unmanned plane.
Owner:中国人民解放军63961部队

System and method for authenticating credible identities on basis of safety chips

The invention provides a system and a method for authenticating credible identities on the basis of safety chips. The method includes allowing a credible authentication server and a credible terminal to apply for platform certificates from the same credible third party; allowing the credible authentication server to add the credible terminal into registered terminal lists of the credible authentication server after the platform certificates are successfully applied, storing the corresponding certificate of the credible terminal and allowing the credible authentication server to add new users into registered user lists; allowing the users on the credible terminal to access the corresponding server after the credibility of platforms is authenticated and the identities of the users are authenticated. The credibility of the platforms is bidirectionally authenticated by the credible authentication server and the credible terminal. The identities of the users are authenticated so that the authenticity of the identities of the users can be verified. The platform certificates comprise platform identity certificates and platform encryption certificates. The system and the method have the advantages that the credibility of the platforms is authenticated by the aid of the safety chips, so that the authenticity of the identities of the authentication server and the terminal and the safety of the platforms can be mutually confirmed by the authentication server and the terminal, and the safety of user identity authentication procedures can be guaranteed.
Owner:成都卫士通信息产业股份有限公司

Safe and reusable single program initiation (SPI) peripheral interface circuit

InactiveCN102231143AEnsure safetyAdd secure transmission moduleElectric digital data processingData bufferData transmission
The invention discloses a safe and reusable single program initiation (SPI) peripheral interface circuit. The circuit comprises a data buffer, an interruption and direct memory access (DMA) control module, a register control module, an advanced peripheral bus (APB) Slave interface module, a clock fractional frequency module, a command resolving module and a safe transmission module, wherein the data buffer is used for buffering receive data (RXD) and transmit data (TXD); the interruption and DMA control module is used for supporting two different types of data processing modes, namely an interruption mode and a DMA mode; the register control module is used for allocating sequential control between a register and modules; the APB Slave interface module is used for interacting with a central processing unit (CPU) based on an APB; the clock fractional frequency module is used for generating 2-256 random fractional frequency clocks to an external device to realize flexible allocation of baud rate; the command resolving module is used for resolving a command from a host machine when working mode of an interface circuit is in a slave mode; and the safe transmission module is used for transforming transmission data from series connection to parallel connection and vice versa and guaranteeing data transmission safety by virtue of a cyclic redundancy check (CRC) algorithm and an automatic repeat request (ARQ) technology. The safe and reusable SPI peripheral interface circuit supports switch between a major mode and a slave mode, and guarantees the data transmission safety.
Owner:ZHEJIANG UNIV

Cloud security storage and processing method and system for rail transit monitoring data

The invention relates to a cloud security storage and processing method and system for rail transit monitoring data. The system comprises a cloud security control server as well as a client, a data acquisition system and a cloud computing cluster connected with the cloud security control server. According to the method, data are ciphered, and a phenomenon that a user cannot decipher initial data without a public key is guaranteed, so that the privacy of the data is guaranteed; during operations such as access, enquiry and the like performed by the data acquisition system and the client on the cloud platform data, the cloud security control server is required to send requests, while the data acquisition system and the client cannot perform data access with the cloud platform directly; and the cloud security control server can conveniently configure and construct various data security schemes, such as authority management of user classification, backup management of monitoring data, management of different place clusters and the like, and the schemes can be directly completed on the control server. According to the cloud security storage and processing method and system for the rail transit monitoring data, storage and processing security of the rail transit monitoring data can be guaranteed.
Owner:BEIJING TAILEDE INFORMATION TECH

Digital certificate safety lock device and digital certificate authentication system and method

InactiveCN102255730AVersatility and applicabilityEnsure safetyUser identity/authority verificationAuthentication systemInternet bank
The invention relates to a digital certificate safety lock device and a digital certificate authentication system and method. The digital certificate safety lock device comprises a universal encryption and digital signature microcontroller, an audio plug and a first modulation and demodulation module, wherein the universal encryption and digital signature microcontroller is provided with an encryption and digital signature module and a storage for storing a digital certificate, a key of the digital certificate and encryption and decryption algorithms; and the first modulation and demodulation module is used for modulating data information from the encryption and digital signature module for transmitting through an MIC (Microphone) pole of the audio plug, demodulating a signal received from a first sound channel pole of the audio plug and transmitting the demodulated signal to the encryption and digital signature module. The digital certificate safety lock device is provided with a universal audio interface plug which has high university and adaptability and can support communication terminals such as mobile phones, tablet computers, PDAs (Personal Digital Assistants) or PCs (Personal Computers) and the like, with audio interfaces. Due to the functions of independent hardware signature, digital certificate encryption and the like, the security of application logon and transactions of Internet banks or enterprises can be ensured to the maximum extent.
Owner:吴沙林 +1

High-ground stress soft rock highway tunnel supporting method

The invention discloses a high-ground stress soft rock highway tunnel supporting method. The high-ground stress soft rock highway tunnel supporting method comprises the steps of: A. excavating upper steps, and carrying out anchor-plate retaining construction; B. erecting second I-shaped steel supports for the upper steps after ending anchor-plate retaining; C. building foamed concrete buffer layers for the upper steps; D. carrying out secondary injection concrete construction on the upper steps; E. excavating lower steps and erecting first I-shaped steel supports for the lower steps, and spraying concrete; F. pouring plastic concrete into the lower steps; G. erecting second I-shaped steel supports for the lower steps, and spraying the concrete; H. carrying out secondary lining construction on the lower steps; J. backfilling inverted arches; and K. carrying out secondary lining construction on the upper steps, that is, determining the erection position of a formwork by measurement lofting, carrying out arch crown backfill grouting by the concrete having the same grade with a tunnel lining, and dismantling a plug mold after the strength of the arch crown concrete is satisfied. The high-ground stress soft rock highway tunnel supporting method has an obvious effect on control on large deformation of a soft rock tunnel under a high-ground stress, is simple, convenient and easy and is simple in operation and low in cost.
Owner:CCCC SECOND HIGHWAY CONSULTANTS CO LTD

Application program control method based on two-time signature verification technology

ActiveCN103886260AEnsure safetyEfficient verification schemePlatform integrity maintainanceProgram loading/initiatingSecurity functionTime signature
An application program control method based on a two-time signature verification technology is achieved by performing two times of signing and two times of signature verification on application programs on an android terminal. Security detection is performed on the application programs through a reliable third-party security detection mechanism, the application programs passing the detection will be signed by the third-party security detection mechanism, and then the signed applications are returned to developers. When the application programs are installed on the intelligent android terminal, security detection is performed on the application programs first to see whether the application programs are signed by the third-party security detection mechanism or not, and signatures are verified; if signatures of the third-party detection mechanism do not exist or the signatures cannot pass verification, installation of the application programs is refused. Through the technical scheme, the application program control method based on the two-time signature verification technology has the advantages that signature information is fixed through introduction of the third-party detection signatures and a security control module of the android terminal so that secure application programs can be downloaded and installed in an android system through multiple channels, and while security of the android terminal is guaranteed, a flexible and efficient application program verification scheme is provided.
Owner:INST OF INFORMATION ENG CAS +1

Distributed cryptograph full-text retrieval system

The invention provides a distributed cryptograph full-text retrieval system. The system comprises a database, a login module, an enquiry module, a result set display module, a document management module, an index module, an audit management module, a user management module and an authorization management module, wherein the enquiry module comprises an enquiry word splitting module, an enquiry encrypting module, an enquiry sub module, an access control module, a cryptograph retrieval word Hash module, a result set merging module and a result set ordering module; and the index module comprises an index word splitting module, an index encrypting module, a constructed distributed index module and a cryptograph index word Hash module. The system encrypts and processes document information and stores the document information in a distributed mode, encrypts index words and distributes the encrypted index words to different servers to construct a distributed cryptograph index library, and adds graded access control to the index library so as to improve the security and validity of full-text retrieval. The system can realize the full-text information retrieval of the cryptograph under a distributed environment, ensures the security retrieval of sensitive data, and has the characteristics of strong security, high execution efficiency and strong expandability.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis

The invention discloses a method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis. Before a first subkey K1 carries out operation on data, an algorithm process is kept the same with an original DES process, after xor is conducted on a plaintext through the subkey K1 in a first round, a mask off code X is led in, operation of encryption processes from a following second round to a fifteenth round is similar, only numerical values of random numbers of the xor are different, and correctness of processing procedures in the arithmetic is ensured. At last, the mask off code X on the xor is output in a sixteenth round, real ciphertext information is restored through inverse permutation between initial permutation (IP) and final permutation (FP) and a mask off code X4. According to the DES, due to the fact that values and positions of mask off codes added in the first round and the last round are different from those of other rounds, namely encryption by non symmetrical mask off codes, so that effects of the mask off codes cannot be eliminated by adoption of a hamming distance model, and therefore power attack on the DES can be prevented, and the purpose of ensuring safety of a DES secret key is achieved.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products