Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

161results about How to "Guarantee authority" patented technology

Third-party authentication security protection system and third-party authentication security protection method based on online security protection of electronic evidence

The invention discloses a third-party authentication security protection system and a third-party authentication security protection method based on the online security protection of an electronic evidence and relates to an information processing technology of a computer. The method comprises the following steps that: after sending a security protection request to a server side, a client side generates a Hash value associated with electronic data which is subjected to security protection and transmits the Hash value to the server side for storage; the client side sends an authentication security protection request, and the server side compares a client side Hash value which is stored in the system with the Hash value which is transmitted by the client side to judge whether the security protection behaviors of the client side are objective and real; communication between the client side and the server side is encrypted by using a secure cryptographic algorithm; the server side carries out association processing on all Hash values in the system to ensure that the Hash value which is stored in the server side and associated with the electronic data cannot be falsified; and when the used cryptographic algorithm is decoded, the client side applies for updating of security protection, and carries out security protection processing on data to be required for security protection and result data generated by the last security protection application again so as to ensure the continuous security of the system.
Owner:重庆兴际云大数据科技有限公司

Block-chain-based vehicle exhaust gas data analysis method and device, and server

The invention relates to the technical field of block chains and provides a block-chain-based vehicle exhaust gas data analysis method and device, and a server. The method comprises: receiving vehicleinformation and vehicle exhaust data submitted by a vehicle through a vehicle-mounted device; determining a vehicle model of the vehicle according to the vehicle information; acquiring an analysis model of vehicle exhaust data corresponding to the vehicle model of the vehicle according to a pre-stored smart contract; and analyzing the vehicle exhaust data based on the analysis model and obtainingan exhaust gas analysis report; and registering the exhaust gas analysis report in a block chain and carrying gout full-network broadcasting. According to the invention, the analysis model of the exhaust gas data corresponding to the vehicle model is obtained from the smart contract, the exhaust gas data uploaded by the vehicle-mounted device are analyzed, and the exhaust gas analysis report is obtained; and the reported is registered in the block chain and is broadcasted in the full network. Because of the exhaust gas data provided by the vehicle-mounted device, the authenticity of the exhaust gas data is ensured; and the exhaust gas analysis report is stored in block chain mode and can not be tampered, so that the authority of the exhaust gas analysis result is ensured.
Owner:GOLO IOV DATA TECH CO LTD

Industrial control system vulnerability trend analysis and early warning method and system

ActiveCN109818985AFix hidden vulnerabilities in a timely mannerAvoid production accidentsData switching networksInformation analysisPublic network
The invention discloses an industrial control system vulnerability trend analysis and early warning method and system, and the method comprises the steps: the simulation establishment of a plurality of probes is carried out with a core protocol in an industrial control system, and enabling the probes to be deployed in a public network and an intranet; The probe collects attack information in an interactive mode; The simulated industrial control system probe sends the collected attack information to a data analysis module, and the data analysis module is responsible for data analysis and vulnerability mining; The data analysis module generates an attack utilization rule base and a vulnerability base according to data analysis and vulnerability mining results; And the data analysis module analyzes the attack information sent back by the matching probe by using the generated attack utilization rule base and the vulnerability base, and reports the analysis result of the attack informationto the security equipment and the early warning display platform. According to the simulation industrial control system, the simulation industrial control system is induced to send an attack to the simulation industrial control system, an attack means is collected, vulnerabilities are analyzed, and serious vulnerability information existing in a production environment or to be utilized is early warned to a user.
Owner:江苏亨通工控安全研究院有限公司

Data right confirmation method and system based on block chain technology

The invention discloses a data right confirmation method and system based on a block chain technology. The method comprises the following steps: initializing and verifying a digital certificate; generating a user DID and a data DID and uploading the user DID and the data DID; calculating a hash value of the data to be subjected to right confirmation and signing to obtain the hash value and a signature; applying an authoritative timestamp according to the hash value of the to-be-confirmed data; generating a data certificate of the to-be-confirmed data according to the uplink user DID, the data DID, the timestamp, the hash value and the signature, verifying the data certificate, calculating the hash value of the data certificate, and signing the hash value of the data certificate to obtain a signature certificate; and uploading the verified data voucher and signature voucher to obtain right confirmation record uplink hash and returning the right confirmation record uplink hash to the client. According to the invention, the decentralized digital identity DID is adopted, and the data right confirmation information of the to-be-confirmed right data is stored in the block chain in the form of the verifiable certificate, so that the right confirmation function of the to-be-confirmed right data is realized, and the characteristics of verifiability, traceability, tamper resistance and the like of the data right confirmation information are ensured.
Owner:JIANGSU PAYEGIS TECH CO LTD +1

Commodity anti-counterfeiting traceability system, method, device and storage medium

InactiveCN109360000AGuarantee authenticity and reliabilityPremium shopping experienceCo-operative working arrangementsCommerceBlockchainInternet of Things
The invention discloses a commodity anti-counterfeiting traceability method, which comprises the following steps: S1, obtaining the information to obtain the identification information of the terminal, confirming whether the terminal has the operation authority, if so, executing the step S2; S2, obtaining the identification information of the terminal, confirming whether the terminal has the operation authority or not. S2, obtaining commodity information and commodity circulation information written in the information obtaining terminal, associating the commodity information and commodity circulation information with the commodity traceability code, and uploading the commodity information and commodity circulation information to the block chain; S3, receiving an access instruction issued by the access terminal, wherein the access instruction includes an identification traceability code, obtaining commodity data of a corresponding commodity on a block chain according to the access instruction, and pushing the commodity data to the access terminal, the commodity data including commodity information and/or commodity circulation information. The invention is based on the internet of things technology to directly dock the service data, realizes decentralization by using the block chain technology, effectively prevents human intervention and counterfeiting, ensures the commercial secrets of each enterprise, and makes the commodity anti-counterfeiting traceability system stable and reliable.
Owner:SF TECH

Method for calculating direct lightning tripping-out rate of distribution line up to 35kV

The invention relates to a method for calculating the direct lightning tripping-out rate of a distribution line up to 35kV. In the method, firstly, the lightning damage condition of the region where the distribution line is arranged, and the line parameters and the tower parameters are obtained, and the probability of the event that the lightning current hits the towers and the probability of the event that the lightning current hits the wires are obtained. Secondly, in view of the special neutral point grounding manner of the distribution line, when the lightning current directly hits wires, and two phase flashover and three phase flashover of insulators occur, and the amplitude of the lightning current is calculated through a brand new formula. the simulation model that the lightning current hits towers and lightning conductors under the condition of a specific tower shape and a specific loop is established by means of electromagnetic transient simulating calculation software, the amplitude of the lightning current which causes two phase flashover and three phase flashover of the insulators is obtained, furthermore, the straight hit tripping-out rate is calculated through a new formula, the back flashover tripping-out rate is calculated through a new formula, and by adding the straight hit tripping-out rate to the back flashover tripping-out rate, the total straight hit tripping-out rate can be obtained. The method for calculating the direct lightning tripping-out rate of the distribution line up to 35kV is suitable for calculating the tripping-out rate of the distribution line under the condition of different tower shapes and loops, and can provide basis to lightning damage assessment and line reconstruction.
Owner:STATE GRID JIANGXI ELECTRIC POWER CO LTD RES INST +2

Surrounding rock mechanical parameter automatic testing system and method suitable for TBM

The invention discloses a surrounding rock mechanical parameter automatic testing system and a surrounding rock mechanical parameter automatic testing method suitable for a TBM. The surrounding rock mechanical parameter automatic testing system comprises a material collecting part, a grabbing part, a visual processing device and a rock abrasiveness testing device, wherein the material collecting part which can collect rock slag in a tunneling process of the TBM in real time; the grabbing part can grab arbitrary rock slag from the obtained rock slag; the visual processing device can perform three-dimensional imaging on the tested rock slag in an infrared distance measurement mode, calculates positions of loading points of an abrasiveness testing experiment, determines whether the tested rock slag meets requirements or not according to the distance between the loading points, if so, determines actual positions of the loading points, and determines that a region, meeting a set condition,on the surface of the rock slag serves as an action region of the abrasiveness testing experiment; and the rock abrasiveness testing device can automatically carry out abrasiveness testing on tested rock slag meeting the requirements. The surrounding rock mechanical parameter automatic testing system and the method have the advantages of being high in timeliness, high in automation degree, safe, economical and the like, effectively solve the problem that surrounding rock strength information of current TBM construction is difficult to obtain in real time, and provide real-time surrounding rockcondition information and a control parameter decision basis for TBM tunneling.
Owner:山东百廿慧通工程科技有限公司

Terminal identifier parsing and service transmission method, system and device in integrated network

The invention discloses a terminal identification analyzing method in an integrated network, comprising the following steps that; A. a demand message sent to a source terminal is received and comprises a service identifier demanded by the source terminal; B. a destination terminal identifier corresponding to the service identifier demanded by the source terminal is found out in the correspondenceof the terminal identifier stored in advance and the service identifier supported by the terminal; C. a reply report is sent back to the source terminal and comprises the destination terminal identifier. The terminal identification analyzing method realizes the process of analyzing the terminal identifier and provides the good support for gaining access to the integrated network for the source terminal of an external network; in addition, the method realizes the effective authentication of the identifier and guarantees the validity and the authority of the identifier as well as guarantees thesecurity of the network data transmission. The invention also discloses a terminal identification analyzing system in the integrated network and a device as well as a method for transmitting the service in the integrated network and a system and a device.
Owner:HUAWEI TECH CO LTD +1

Detector and detecting method for three parameters of escalator

Disclosed are a detector and detecting method for three parameters of an escalator. The detector for the three parameters of the escalator comprises a main test device, a secondary test device, a laser range finder and an electric box, the secondary test device comprises a fixing base, suckers, a fixed disc, a movable disc and emitting and receiving heads, three end portions of the fixing base are respectively provided with one sucker, the fixed disc is perpendicularly fixed in the middle of the fixing base, the included angle between the center line of the fixed disc and the center line of an upper transverse pipe of the fixing base ranges from 32 degrees to 42 degrees, one side of the fixed disc is connected with the movable disc, the top of the movable disc is provided with a probe frame, and the emitting and receiving heads are fixed at the two ends of the probe frame; the main test device and the secondary test device are identical, and the laser range finder and the electric box are further fixed on the probe frame of the main test device; a steel wire rope is connected between the main test device and the secondary test device. The three parameters of the escalator can be automatically detected, and authority, scientificity, seriousness and authenticity of an examining report are guaranteed.
Owner:SHANDONG SPECIAL EQUIP INSPECTION LIAOCHENG BRANCH

TBM-carried rock slag online compressive strength testing system and method

ActiveCN110823704AMeet the requirements of real-time online analysis and testingSatisfy faster requirementsMaterial strength using tensile/compressive forcesUsing optical meansVision processingGrating
The invention discloses a TBM-carried rock slag online compressive strength testing system and a TBM-carried rock slag online compressive strength testing method. The TBM-carried rock slag online compressive strength testing system comprises a robot, a grating projection device, a visual processing device and a compressive strength testing device, wherein the robot is used for acquiring rock slagin the TBM tunneling process; the grating projection device can project structured light to the tested rock slag to form a two-dimensional light bar image in the surface shape of the rock slag; the visual processing device can calculate to obtain a rock slag three-dimensional shape model according to the two-dimensional light bar image shot and projected onto the rock slag surface to form distortion; a loading point position is calculated by means of a rock slag three-dimensional shape model, and whether the tested rock slag meets the requirements or not through the distance between the loading points is judged; and the compressive strength testing device is used for automatically testing the compressive strength of the tested rock slag meeting the requirements. The TBM-carried rock slag online compressive strength testing system and the TBM-carried rock slag online compressive strength testing method have the beneficial effects of being high in timeliness, high in automation degree, safe, economical and the like, effectively solves the problem that surrounding rock strength information of current TBM construction is difficult to obtain in real time, and real-time surrounding rockcondition information and a control parameter decision basis are provided for TBM tunneling.
Owner:山东百廿慧通工程科技有限公司

Multimedia digital watermark evidence taking mobile phone

The invention discloses a multimedia digital watermark evidence taking mobile phone. The multimedia digital watermark evidence taking mobile phone is an intelligent evidence taking mobile phone whichuses the unique stability, concealment, security and fragility of a fragile digital watermark to ensure the integrity, the authenticity, the stability, the reliability and the authority of photographed and recorded multimedia data based on an image, audio and video fragile digital watermark embedding and extraction technology. When a user uses the mobile phone, imperceptible and unmodifiable fragile digital watermark information with unique identity confirmation is embedded in real time in a photographed image, audio and video. The image or the audio or the video with the fragile watermark canbe normally used and distributed but can not be modified manually. The authenticity of a file can be identified according to whether the photographed digital file contains the digital watermark information. The evidence taking process is quick, efficient, accurate, safe and convenient. The evidence taking content has the uniqueness of a digital evidence and the legal authority of evidence use, and the multimedia digital watermark evidence taking mobile phone disclosed in the invention can be used for evidence taking and recording in fields such as judicature, law enforcement and claim.
Owner:CHENGDU YUFEI INFORMATION ENG

Single machine application verification system compatible with sparc V8 framework SOC

The invention relates to a single machine application verification system compatible with a sparc V8 framework SOC. The system comprises a single machine application verification board, an excitation source and a central control computer. For the single machine application verification board, application verification of multiple chips and system integration for a single chip are finished only by replacing chip daughter boards on the premise of maximized design of an application verification mother board; the excitation source required in an application verification process is subjected to standardized and maximized development, so that repeated use and maintenance of the single machine application verification system can be ensured, the development cost and cycle of the application verification system are greatly reduced and shortened, and system integration design and system simulation based on a to-be-verified chip can be realized; and application verification examples of mature modules are integrated in the central control computer, and the whole verification process is controlled, so that the efficiency and comprehensiveness of chip application verification are ensured, a universal platform for development by users is formed, and the performance of the verification system is exerted to the maximum extent.
Owner:XIAN MICROELECTRONICS TECH INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products