Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

30results about How to "Ensure system security" patented technology

Remote intelligent evidence obtaining system and method based on mobile Internet

The invention relates to a cloud intelligent evidence obtaining system of a mobile Internet. The system comprises a client installing an evidence-obtaining App and used for sending an evidence-obtaining request to the evidence-obtaining App, a cloud server for verifying the evidence-obtaining request and automatically loading a corresponding intelligent terminal platform and a target App accordingto the evidence-obtaining request after passing of the verification, a login system for detecting the fact that the intelligent terminal platform and the target App are installed and automatically log in the cloud server according to the evidence-obtaining request, and a screen-recording evidence-obtaining system for controlling the cloud server to share the screen thereof to the client installing the target App after successful login and starting screen recording of the cloud server after screen sharing; and the cloud server automatically performs encryption operation and time stamping processing on screen-recorded videos after finishing of screen recording. According to the system, the whole-evidence obtaining process and stored content are both stored in the cloud server, and the cleanness and the system security of the whole evidence-obtaining process are guaranteed.
Owner:真相网络科技(北京)有限公司 +1

Centralized scheduling method based on distributed terminal

The invention relates to a measuring system, in particular to a centralized scheduling method based on a distributed terminal to the measuring system. A remote gauger in a workstation inputs an on-site measuring device idle status to a workstation input device; a worker in the workstation inputs information requiring measuring to a station input device; a scheduling server processes workstation and station information obtained in a real-time manner via a communication network; based on a computing power of the workstation and a "first-in first-out" principle, the information requiring metering of each station is assigned to each station in the idle state, and assignment information is simultaneously transmitted to a station display device; the remote gauger in the workstation obtains a work task through the workstation display device, inputs a message that the on-site measuring device is in a working state into the workstation input device, and begins to measure the work task through the on-site measuring device; the remote gauger in the workstation, after completing a metering work, inputs a measuring result and a message that the on-site measuring device is in an idle state to the workstation input device; and the scheduling server receives measuring results of all workstations and the workstation on-site measuring device statuses, transmits the measuring results to a corresponding station completing the measuring task, and assigns a new measuring task to an idle station.
Owner:SHANXI TAIGANG STAINLESS STEEL CO LTD

Thermal treatment method for preventing stainless steel from being sensitized in water chamber of high-pressure heater

The invention relates to the technical field of heat treatment, in particular relates to a thermal treatment method for preventing stainless steel from being sensitized in a water chamber of a high-pressure heater, and aims at solving the problems that the stainless steel is sensitized and the expanding quality is bad caused by the large difference of linear expansion factors since materials of a pipe are different during the heat treatment after the girth welding of the water chamber of the high-pressure heater. The thermal treatment method is characterized in that the thermal treatment method is carried out on an outer housing, a thick pipe plate and a U-shaped pipe of the high-pressure heater, a welding line and a heat affected zone of the water chamber are annealed by the local heat treatment, and a thermal insulation carpet is arranged at the welding line side of the stainless steel to prevent heat energy to be directly radiated to a stainless steel part, so that the temperature of the stainless steel part can not be risen to the sensitization temperature. The temperature of the stainless steel part can not be risen to the sensitization temperature, the anti-scouring function of the U-shaped pipe can be improved, the pipe exposure accident rate of the equipment can be reduced, and the service life of the equipment can be prolonged.
Owner:HANGZHOU BOILER GRP CO LTD

Method and system for realizing secure interaction between systems

The invention provides a method and system for realizing secure interaction between systems. After a debugging request is sent to a debugged system by a debugging system, the method comprises the following steps of: receiving the debugging request sent by the debugging system by the debugged system, wherein the debugging request comprises verification information and debugging information of the debugging system; and executing verification logic for the verification information of the debugging system, executing a debugging task for the debugged system according to the verification result, ifthe verification information is successfully verified, executing the debugging task by the debugged system according to the debugging information and returning a debugging result to the debugging system, and otherwise, informing the debugging system that the debugging task fails. According to the method and system, the security problem of debugging interfaces between debugging systems and debuggedsystems in the prior art is solved. Moreover, verification manners can be dynamically extended, so that extensibility of system debugging interfaces is improved under the premise of ensuring the system security and data security of business systems.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Penetration test method in allusion to mobile geographic information security of underground pipelines

The invention discloses a penetration test method in allusion to mobile geographic information security of underground pipelines. The method comprises the following steps: changing the suffix of an APK file into zip and decompressing the compressed file to obtain a class.dex file therein; copying the class.dex file into a catalogue to which a dex2jar.bat file belongs, executing a dex2jar class.dex command under a command line, and generating a class-dex2jar.jar file under the current catalogue; opening a jd-gui code check tool, importing the class-dex2jar.jar file and checking a reversed application source code; setting the address of a test machine and collecting a server-side interface list by utilizing the test machine; and carrying out vulnerability scanning on a server by using a burp suit tool through the server-side interface list, outputting a vulnerability analysis statement to the test machine, and carrying out sql injection test on a server side by utilizing a sqlmap tool so as to detect the sql injection vulnerabilities. The penetration test method is capable of finding the vulnerabilities of the application service programs on the underground pipeline map servers in allusion to the mobile GIS applications which carry underground pipeline route data, so as to prevent the data leakage of the underground pipelines.
Owner:BEIJING INST OF RADIO METROLOGY & MEASUREMENT

Software management system and software protection method thereof

The invention discloses a software management system and a software protection method thereof. The software management system comprises an analysis module, a reading module, a simulation sandbox module and a management module; the analysis module is used for analyzing a software installation package, therefore the size and brief introduction information of software is obtained; the reading moduleis used for reading the analyzed software installation package and obtaining configuration information of software; the simulation sandbox module is a created sandbox model completely isolated from the main system, and virus Trojan and the like carried in software can be prevented from invading the main system while the software is started; and the management module is used for performing operations such as unloading and updating on the installed software, thereby facilitating centralized management. According to the method and the system, the privacy setting module is added on the basis of existing software unloading updating and permission setting, and advanced permissions such as hiding, opening and rewriting of the software are set by logging in an account, so that the management rangeof the software is widened, the management effect of the software is improved, and meanwhile, personal privacy is protected.
Owner:NANJING CHENXIAO SOFTWARE TECH CO LTD

Special individual household central air conditioning system with geothermal-energy water machine for storied building

The invention relates to a special individual household central air conditioning system with a geothermal-energy water machine for a storied building. The special individual household central air conditioning system with the geothermal-energy water machine for the storied building comprises an outdoor device and an indoor machine, wherein the outdoor device comprises an outdoor geothermal circulating well cluster which uses a cell building as a unit and a main pipe connected with the outdoor geothermal circulating well cluster; the indoor machine comprises a geothermal-energy water machine main body which uses each inhabitant of the cell building as a unit, and branching pipes, centralized distributors and tail ends, which are connected onto the main pipe in parallel; the geothermal-energy water machine main body is communicated with the corresponding branching pipes. By using the special individual household central air conditioning system with the geothermal-energy water machine for the storied building, a domestic central air conditioning system is enabled to march toward a new stage; new vitality is added to the revolution of a domestic air conditioner by flexible and intelligent usage characteristics, concise and economic modular mounting and the usage of environment-friendly materials.
Owner:河北华威新能源科技有限公司

A method and device for implementing secure interaction between systems

The invention provides a method and system for realizing secure interaction between systems. After a debugging request is sent to a debugged system by a debugging system, the method comprises the following steps of: receiving the debugging request sent by the debugging system by the debugged system, wherein the debugging request comprises verification information and debugging information of the debugging system; and executing verification logic for the verification information of the debugging system, executing a debugging task for the debugged system according to the verification result, ifthe verification information is successfully verified, executing the debugging task by the debugged system according to the debugging information and returning a debugging result to the debugging system, and otherwise, informing the debugging system that the debugging task fails. According to the method and system, the security problem of debugging interfaces between debugging systems and debuggedsystems in the prior art is solved. Moreover, verification manners can be dynamically extended, so that extensibility of system debugging interfaces is improved under the premise of ensuring the system security and data security of business systems.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Remote intelligent forensics system and method based on mobile Internet

The invention relates to a cloud intelligent evidence obtaining system of a mobile Internet. The system comprises a client installing an evidence-obtaining App and used for sending an evidence-obtaining request to the evidence-obtaining App, a cloud server for verifying the evidence-obtaining request and automatically loading a corresponding intelligent terminal platform and a target App accordingto the evidence-obtaining request after passing of the verification, a login system for detecting the fact that the intelligent terminal platform and the target App are installed and automatically log in the cloud server according to the evidence-obtaining request, and a screen-recording evidence-obtaining system for controlling the cloud server to share the screen thereof to the client installing the target App after successful login and starting screen recording of the cloud server after screen sharing; and the cloud server automatically performs encryption operation and time stamping processing on screen-recorded videos after finishing of screen recording. According to the system, the whole-evidence obtaining process and stored content are both stored in the cloud server, and the cleanness and the system security of the whole evidence-obtaining process are guaranteed.
Owner:真相网络科技(北京)有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products