Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

47results about How to "Ensure security and confidentiality" patented technology

Method and system for processing collection and payment among bank accounts

The invention provides a method and a system for processing collection and payment among bank accounts. The method comprises the following steps that: a mail remittance system acquires payment information comprising a payer account number, a payee email address, a payee name, a transaction amount and a transaction password which are input by a payer, and generates a remittance number according to the payment information; the mail remittance system sends a mail notification request to a bank mail system so as to allow the bank mail system to send a notification mail; the mail remittance system sends a transfer instruction to a bank core system so as to allow the bank core system to perform transfer operation corresponding to the remittance number from a payer account to an intermediate account; the mail remittance system acquires collection information comprising a payee mail address, the remittance number, the transaction password, a payee account and an opening bank which are input by the payee, and checks the collection information according to local storage information; and the mail remittance system sends a payment instruction to the bank core system if the checking is successful so as to allow the bank core system to perform the transfer operation from the intermediate account to the payee account.
Owner:MINSHENG BANKING CORP

Weighing system communication method based on digital sensor

The invention relates to a communication method for weighing system based on digital sensor, which requires files building of a key and its password on release date as well as a key for digital sensor. The process of the said method is that: firstly, the key and its password for the storage system of the weighing instrument are downloaded to the digital sensor, from which the key and its password on release date can be obtained; secondly, the weighing instrument sends the communication orders to the target digital sensor, and the encrypted data packet, encrypted and generated through key files of digital sensor, data flow and system cipher, is sent to the target digital sensor; thirdly, after monitoring and receiving the packet, the target digital sensor will make a deciphering and recovery to obtain the system raw data by system key and key on release date, and then take it as the communication order; fourthly, after receiving the communication order, the target digital sensor will make a data packet of the sampled weights, and the data packet, the key on release date and the system cipher, encrypted and generated as the release encrypted data packet, will be sent to the weighing instrument; lastly, after monitoring and receiving the release encrypted data packet, the weighing instrument will make a encryption to obtain the weight data by system cipher and key on release date. Thus the transmission and communication of weight data is achieved. The invention ensures a security and reliability of the channels for weight data transmission.
Owner:METTLER TOLEDO CHANGZHOU PRECISION INSTR +2

Mobile terminal, method and server for realizing data management

The invention provides a mobile terminal, a method and a server for realizing data management. The mobile terminal comprises a human-computer interface unit, a data management unit and a multimedia information service unit, wherein the human-computer interface unit is used for inputting a backup command and extracting data to be backed up from data information in the mobile terminal according to the backup command; the data management unit is used for preprocessing the data to be backed up after receiving the data to be backed up from the human-computer interface unit; and the multimedia information service unit is used for encapsulating the preprocessed data to be backed up into a multimedia information service message body and transmitting the multimedia information service message body in which the preprocessed data to be backed up is encapsulated to the server. The embodiment of the invention has the following advantages that: data backup technology and data recovery technology provided by the invention can be realized across platforms on different mobile terminals, which sufficiently ensure the security and confidentiality of the data, and simultaneously, provides a variety of selections for manufacturers and enhances user experience.
Owner:北京摩软科技有限公司

Online patrol management system

The present invention provides an online patrol management system including a patrol interphone, a patrol point label and a backstage terminal, the patrol interphone and the patrol point label are in wireless connection; the patrol interphone and the backstage terminal are in wireless connection; the patrol point label is arranged on a patrol route, and is used for marking patrol point information; the patrol interphone is used for receiving the patrol point information of the patrol point label, and sending the patrol point information to the backstage terminal, and the backstage terminal is used to collect the patrol point information and display supervision in real time. The online patrol management system adopts RFID technology, wireless data transmission technology, database information management technology and the like to achieve access of the patrol point information and real-time sending of the patrol point information to the backstage terminal, and the online patrol management system has the advantages of no wiring, easy installation, convenient operation, portability, stable performance and the like, and is not affected by humidity, temperature and normal working range, and system expansion and line change are easy to maintain.
Owner:SHANGHAI WULING SHENGTONG INFORMATION TECH CO LTD

WPKI security monitoring and control method and system based on mobile terminal

The embodiment of the invention provides a WPKI security monitoring and control method and system based on a mobile terminal. The method mainly includes the steps that the mobile terminal of a user sends a connection request to the security monitoring and control system, wherein the connection request carries digital certificate information of a user terminal; the security monitoring and control system verifies a digital certificate of the user terminal through a catalog server and returns a connection response to the mobile terminal after the digital certificate passes verification; an SSL connection channel is set up between the mobile terminal and the security monitoring and control system through the digital certificate, an operation inquiry request is sent to the security monitoring and control system through the SSL connection channel, and the security monitoring and control system returns an information report to the mobile terminal through the SSL connection channel. According to the method and the system, encryption is conduced on transmitted data in a wireless network, security and confidentiality of information are ensured, and user information can not be obtained or tampered by lawbreakers even under the condition that the user information is cut out by the lawbreakers.
Owner:AEROSPACE INFORMATION

Application interaction processing method and device

The embodiment of the invention discloses an application interaction processing method and device, and the method comprises the steps: enabling a first server corresponding to a first application to obtain target event information sent by a second server corresponding to a second application, wherein the target event information comprises a service request object based on the first application andthe identity information of a target member; obtaining an access permission of the target member according to the identity identification information, and obtaining a service service data packet corresponding to the service request object in the first application according to the access permission; sending the service service data packet to a second server, so as to enable the second server to forward the service service data packet to a terminal of a target member corresponding to the second application; and transmitting the service data associated with the service service data packet to theterminal of the target member through the second server. By adopting the method and the system, the enterprise internal information can be published to enterprise internal members, so that the privacy and the security of the enterprise internal information are guaranteed.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Remote audio and video technology-based e-commerce purchase management platform

The invention discloses a remote audio and video technology-based e-commerce purchase management platform. The platform is characterized by comprising a client and a server, wherein the client comprises a purchaser unit, a supplier unit and a supervision unit; and the server comprises a registration login unit, a video and voice storage unit, a bidding document encryption and decryption unit, a bidding document release unit, a bidding document judgment unit, a supplier information statistics unit, a supplier bidding hall management unit and a supplied material classification storage unit. An electronic bidding document of the platform uses an asymmetric encryption and decryption algorithm, a CA authentication encryption and decryption algorithm and an electronic signing algorithm; a bid inviter can remotely control the electronic bidding document to be decrypted during bid opening; a supplier inserts a CA Key for performing verification and decryption; after the electronic bidding document is encrypted, the security of a bidding process can be ensured; and the supplier and a purchaser of the platform perform communication negotiation through videos and voices, so that the purchase efficiency can be improved.
Owner:合肥明信软件技术有限公司

Secure and confidential offline software registration authorization method

Confidential software products installed and used by a confidential host in a national security and confidentiality place basically need to be authorized and verified. The invention provides a secureand confidential offline software registration authorization method. Authorization software registration information can be managed at a management end in a unified manner, the whole process is physically isolated from a host, and the potential safety hazard that a storage medium is in direct contact with a secret-related machine in the authorization process is avoided. The security and confidentiality offline software registration authorization method comprises: when the software needs registration authorization, obtaining a unique identifier of the equipment, performing special splicing, reversible and irreversible encryption to generate a registration two-dimensional code, performing local analysis and identification on the two-dimensional code by using physical equipment, performing analysis and decryption by using a management end, performing encryption by using a private algorithm to generate a registration code, and inputting the registration code by the software to perform registration verification authorization; when software needs to migrate or replace hardware equipment, a logout two-dimensional code is generated through encryption, the two-dimensional code is locally analyzed and recognized through physical equipment, a management end analyzes and recovers software authorization, the hardware equipment is migrated or replaced after success, and the hardware equipment can be reused after re-registration.
Owner:JIANGSU BOZHI SOFTWARE TECH CO LTD

Encrypted communication method, encrypted/decrypted communication device, encryption device and decryption device

The invention discloses an encrypted communication method, an encrypted/decrypted communication device, an encryption device and a decryption device which can enhance the security of encrypted communication. In the encrypted communication method, a first device is provided with a first reconfigurable logic circuit, a second device is provided with a second reconfigurable logic circuit, the first reconfigurable logic circuit and the second reconfigurable logic circuit have the same structure, and an encryption configuration file and a decryption configuration file for realizing a cryptographic algorithm are determined between the first device and the second device; the first device controls the first reconfigurable logic circuit according to the encryption configuration file to constitute an encryption logic circuit, encrypts data by utilizing the encryption key and the encryption logic circuit, and transmits the encrypted data to the second device; and the second device receives the encrypted data from the first device, controls the second reconfigurable logic circuit according to the decryption configuration file to constitute the decryption logic circuit, and decrypts the decryption data by using a decryption key and the decryption logic circuit.
Owner:BEIJING DUOSI TECH DEV

System for factory setting recovery of information safety equipment and method for same

The invention discloses a system for factory setting recovery of information safety equipment and a method for the same. An instruction triggering module sends safety alarm information to a main controller when the module receives an operator's request for a factory setting recovery operation; the main controller collects a unique authentication code in an ownership recovery management module and sends the unique authentication code to a recovery authentication manager; the recovery authentication manager transmits the unique authentication code to a remote permission server by an authentication receiving module, and an authentication analysis module analyzes whether matching is successful; and finally, the recovery authentication manager acquires feedback information transmitted by an authentication feedback module, gives a result of authentication permission or authentication prohibition and decides whether factory setting recovery of the equipment needs to be conducted. The factory setting recovery system disclosed by the invention is characterized in that through remote running authentication, a malignant operator is prevented from conducting tampering and deletion at will without authentication, so that user's safety and confidentiality during use of the information safety equipment can be ensured.
Owner:深圳市波普安创技术有限公司

Intelligent monitoring and control system for prison perimeter high voltage power grid

The invention belongs to the technical field of intelligent power grid monitoring and control, and particularly relates to an intelligent monitoring and control system for a prison perimeter high voltage power grid, which comprises a lower computer PLC data acquisition subsystem and an upper computer dynamic monitoring subsystem, wherein the lower computer PLC data acquisition subsystem is used for acquiring various state parameters of operation of the power grid and transmitting the well-processed power grid parameters to the upper computer dynamic monitoring subsystem; the upper computer dynamic monitoring subsystem is used for carrying out early warning processing on the power grid operation parameters, making corresponding feedback according to the early warning information, being linked with other perimeter systems and ensuring the safety of the prison perimeter; and the other perimeter systems comprise a video monitoring system, a door access system, an interphone system and an infrared system. Functions of high voltage power grid intelligent detection, intelligent striking, process recording, region linkage and the like are integrated, the perimeter high voltage power grid and other devices are not mutually independent but operate cooperatively, and prison perimeter safety management intelligence is thus realized.
Owner:QILU UNIV OF TECH

Multifunctional safeguard vehicle capable of providing camping for multiple persons

The invention discloses a multifunctional safeguard vehicle capable of providing camping for multiple persons. According to the technical scheme, the multifunctional safeguard vehicle is characterizedby comprising a vehicle head, a support is arranged at the right end of the vehicle head, a carriage is fixedly arranged at the upper end of the support, the carriage is divided into a meeting area,a first rest area, a second rest area, a bathing area and a leisure area, and the meeting area is located at the left end of the carriage; a conference table and conference chairs are arranged in theconference area, the first rest area is located at the right end of the carriage, the second rest area is located behind the first rest area, the bath area is located at the left end of the first restarea, a passageway is formed between the second rest area and the bath area, the bath area is divided into a toilet and a shower room through a partition plate, and the shower room is located at theright end of the toilet. A first air purification system is fixedly arranged at the top end of the conference area, a second air purification system is fixedly arranged at the top end of the first rest area, and the multifunctional conference table has multiple functions in use and is comfortable and practical.
Owner:JIANGSU ZHENXIANG VEHICLE EQUIP

Fixed-line telephone extension method and system

The invention provides a fixed-line telephone extension method and system. The system comprises a server, a plurality of auxiliary devices which are connected with a plurality of fixed-line telephones in a one-to-one correspondent manner and are connected with the server through a telephone subnet, a plurality of LED lamps which are connected with the server through an LED subnet and a plurality of user terminals which are connected with the LED lamps through visible light communication. The method comprises: the auxiliary devices detect incoming calls of the fixed-line telephones, generate incoming information and contents into a message and report the message to the server; after receiving the message, the server stores the message and broadcasts the incoming information to the user terminals on an application occasion in a visible light form through the LED subnet and the LED lamps; after receiving a listening request fed back by the user terminal, the server dispatches a corresponding incoming call content and sends the incoming call content to the user terminal in the visible light form through the LED subnet and particular LED lamps; and the user terminal broadcasts the incoming call content. The method and the system can be used for achieving mobile communication on occasions where mobile phones cannot be used.
Owner:SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV

Material work order auditing method, device and equipment and storage medium

The invention relates to the technical field of data processing, and discloses a material work order auditing method, device and equipment and a storage medium, and the method comprises the steps: receiving an auditing request, and obtaining a material work order in the auditing request and a to-be-audited material associated with the material work order; transmitting the to-be-audited material to a message processing system, encrypting the to-be-audited material through the message processing system, and generating to-be-audited data; sending the to-be-audited data to an auditing terminal associated with the material work order, and performing interactive interval authentication on the to-be-audited data with the auditing terminal; when a playing completion instruction is detected, performing micro-expression recognition on all the received face data to obtain an emotion recognition result; and sending opinion collection corresponding to the emotion recognition result to an auditing terminal, and obtaining a generated auditing result corresponding to the material work order. Therefore, the confidentiality and security of the to-be-audited data are improved, and the experience satisfaction degree of customers is improved.
Owner:DONSON TIMES INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products