Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

222results about How to "Guarantee information security" patented technology

Starting lock for mobile terminal application program

The invention discloses a starting lock for a mobile terminal application program, and particularly relates to a starting lock of an application program. The starting lock for the mobile terminal application program comprises an operating system platform, the operating system platform is provided with an application program manager which manages at least one application program, and the application program manager comprises a locking module, a storage module and an unlocking module, wherein the storage module stores the locking information of the locking module and relevant starting request information. After the application program manager receives the starting request of an application program, the application program manager analyzes, identifies and judges the starting request, the unlocking module is started for the locked starting request, and the application program manager enables input unlocking information and locking information in the storage module to be matched and judged. According to the starting lock for the mobile terminal application program, the starting request information is extracted and stored during locking, the starting request information is detected, intercepted and captured in use, operation verification is conducted, and therefore individual privacy and information safety are further guaranteed in the using process of the application program.
Owner:宋易霄

Method for vehicle safety remote control and diagnosis and system thereof

The invention provides a method for vehicle safety remote control and diagnosis and a system thereof. A control and diagnosis terminal and a cloud side instruction server perform first identity authentication and key agreement; a vehicle-mounted terminal and the cloud side instruction server perform second identity authentication and key agreement; and the control and diagnosis terminal establishes communication connection with the vehicle-mounted terminal through the cloud side instruction server and performs remote control or remote diagnosis on a vehicle according to the control and diagnosis instruction of a user. Different secret keys are adopted between the control and diagnosis terminal and the cloud side instruction server and between the vehicle-mounted terminal and the cloud side instruction server and so that the information security of remote control and diagnosis information can be guaranteed, and the problem of security insufficiency in the prior art can be effectively solved. The system for vehicle safety remote control and diagnosis has the advantages of being scientific in design, high in practicality, convenient and rapid, high in security and high in reliability.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Intelligent home system

The invention provides an intelligent home system. The system comprises an intelligent home network, the Internet and a dynamic domain name server. The intelligent home network comprises network equipment, a home server and a plurality of intelligent home terminals, wherein the network equipment is in communication connection with the Internet, the home server is in communication connection with the network equipment and is used for information interaction with the network equipment, receiving information sent by the intelligent home terminals and sending control signals to the intelligent home terminals so as to control the work of the intelligent home terminals, and the intelligent home terminals are in communication connection with the home server. The dynamic domain name server is in communication connection with the Internet and is used for receiving a dynamic IP (Internet Protocol) address sent by the network equipment through the Internet, binding the dynamic IP address to the fixed domain name of the intelligent home network, and carrying out domain name resolution. With the adoption of the intelligent home system provided by the invention, the functions, such as video surveillance, leisure and entertainment, intelligent control of household appliances and home environment monitoring, can be achieved, and the customized customization, assembly and association can be achieved; and the information security can be guaranteed because no external operation service platform exists.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Multi-enterprise cloud folder deployment and information interaction method facing common client

The invention relates to a multi-enterprise cloud folder deployment and information interaction method facing a common client. The method specifically comprises the following steps: a plurality of enterprises deploy client content of the enterprises in a cloud folder manner; when the content is approved by verification, a service operation module carries out billing operation on the enterprises; when the billing is successful, a result is expressed in an enterprise user client to carry out information interaction between the enterprise user client and the enterprises; the enterprises can publish information and services in the same sharing cloud folder or one enterprise can publish own information and services in the cloud folder of the other enterprise under the precondition that one enterprise can obtain the allowance of the other enterprise; and the enterprise user can obtain the information and services of a plurality of enterprises at the same time. According to the multi-enterprise cloud folder deployment and information interaction method facing the common client disclosed by the invention, the convenient publishing and management of a plurality of enterprises on the same enterprise user client can be realized, and the efficiency of carrying out the information interaction on the enterprise user and the enterprises is improved; and the multi-enterprise cloud folder deployment and information interaction method is mainly used for fields of propaganda of the enterprises, data collection, membership service, depth and precision marketing, and establishment, duplication and management of a client relation and the like.
Owner:SHANGHAI FLAGINFO INFORMATION TECH

Method and terminal for checking screen lock notification information

The embodiment of the invention provides a method and terminal for checking screen lock notification information. The method comprises the steps that the notification information needing to be displayed is received, and an authentication information input interface is displayed; first authentication information input by a user is obtained and authenticated; if the first authentication information passes the authentication, the information needing to be displayed can be displayed; if the first authentication information does not pass the authentication, whether second authentication information is received is judged; if the second authentication information is received, authentication will be conducted; and when the information passes the authentication, the information can be displayed. The method and terminal for checking the screen lock notification information provided by the embodiment of the invention are characterized in that graded identity judgment is conducted to the user; if the user passes judgment of a first authentication information verification mechanism, the information can be displayed; and if the first authentication information does not pass the judgment, a second authentication information verification mechanism will be started, and the information can be displayed only when the information passes second authentication information verification. In this way, the user can guarantee safety of the information in the terminal; and the user can more easily and conveniently check the current screen lock notification information.
Owner:SHENZHEN GIONEE COMM EQUIP

System and method for preventing unauthorized use of IC card

The invention discloses a system for preventing unauthorized use of an IC card. The system comprises an IC card reader-writer, a microprocessor, a testing UID card, a power supply module, a display module, and an automatic alarming device. The device is capable of preventing the unauthorized use of the IC card mainly by determining whether the data writing-in state of the 0 block data of the 0 sector of the IC card, the number of the IC card, and information stored in the IC card are consistent with related information of a system database. The UID card is tested to determined whether the working of the system is normal. When the working of the system is normal, user IC card operation is carried out. When the IC card is not the original card, the system is capable of forbidding the writing and reading operation of the card, and is used to transmit IC card leakage prompting information to a cell phone of a user and a public security organ by short messages. The principle and the operation of the device for preventing the unauthorized use of the IC card are simple and clear, and therefore whether the IC card information is leaked can be determined accurately, and the safety and the confidentiality of the IC card are greatly improved.
Owner:SHAANXI UNIV OF SCI & TECH

Bag cabinet control method and system based on data sharing center

The invention discloses a storage cabinet control method based on a data sharing center; the method is characterized in that a third-party data sharing center and an interface software are provided; an all-in-one card reader carries out a card authentication, reads the all-in-one card information and sends the corresponding request information to the interface software; the request information comprises an unlocking request message, a position message and user information obtained from the all-in-one card; the interface software put forward an identity verification request to the third-party data sharing center and checks whether the read card has the unlocking authority according to the request information; the third-party data sharing center feeds back the verification information to the interface software; if the verification information proves that the card has the unlocking authority, the interface software sends the unlocking information to the storage cabinet system and a controller drives the unlocking. For the storage cabinet control method, the data sharing center is established by a user party, the all-in-one card reader, the storage cabinet system and the data sharing center are connected by the interface software, thus leading the storage cabinet system to be more conveniently and the safety of the storage cabinet system is greatly improved.
Owner:SUZHOU INST OF TRADE & COMMERCE

Test method and system for information security of transformer substation industrial control equipment

The invention relates to a test method for information security of transformer substation industrial control equipment. The test method includes the steps of: 1. service communication data acquisition; 2. service communication data analysis; 3. test data generation and sending; 4. tested equipment monitoring; and 5.tested equipment operation abnormality judgment. The invention also relates to a system specialized for the abovementioned method. The system includes the following modules connected in sequence: a service communication data acquisition module, a communication data analysis module, a test data generation and sending module, a tested equipment monitoring module and a tested equipment operation abnormality judgment module. By adoption of the system and method provided by the invention, information security vulnerabilities of transformer substation embedded equipment can be effectively mined, system operation and maintenance are assisted and the current information security status of transformer substation industrial control equipment is grasped, information security loopholes of the system are repaired in advance, information security f an industrial control system is guaranteed, and information security risks of national infrastructures are reduced.
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID

Anti-fraud system and method, server and storage medium

The embodiment of the invention relates to the technical field of communication, and discloses an anti-fraud system and method, a server and a storage medium, and the anti-fraud system comprises a suspicious call analysis module, a network data obtaining module, a fusion analysis module and a warning service module. The suspicious call analysis module is used for identifying the call signaling corresponding to the personal account according to a first preset model and recording suspicious call data; the network data acquisition module is used for discriminating the personal internet surfing data according to a second preset model and acquiring network data for accessing a malicious website; the fusion analysis module is used for performing fraud identification on the suspicious call data and the network data according to a third preset model; and the warning service module is used for intercepting and sending out early warning after judging that the personal account is suspected to becheated. By aggregating the call data and the internet surfing data, the fraud event is more accurately and comprehensively recognized, comprehensive reminding and interception are achieved, and the fraud event prevention and control capacity of family users is effectively improved.
Owner:CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1

Smart phone provided with smart system and power saving system, and switching method

Disclosed is a smart phone provided with a smart system and a power saving system. The smart phone comprises a smart system and a power saving system which are disposed in a memory of a smart phone. The power supply system is provided with a general power module, an optimal power saving module and an extreme power saving module, and a user can choose any one mode. Switching buttons are disposed on main interfaces of the smart system and the power saving system. The smart phone further comprises a switching system. The switching system comprises a prompt device, a main controller, a switching device, an information transmitting device and a power amount reminding device. The invention is advantageous in that an extreme power saving dual system can be quickly switched to meet the needs of different users; the power saving system has the characteristics of large icon, large font and contact shortcut, the use for middle-aged and senior people is satisfied, meanwhile the system setting items such as networking are closed, and information security of users is ensured; and two power saving modes of the power saving system are automatically timed to open flexibly at each time period, requirements for daily power saving and nighttime power saving of users are met, smart power saving for users is facilitated, and the effective amount of power saving is up to 40-50%.
Owner:CHONGQING GUOHONG TECH DEV

Heterogeneous network unified authentication method based on physical layer safety

The invention relates to a heterogeneous network unified authentication method based on physical layer safety. The heterogeneous network unified authentication method based on the physical layer safety comprises the steps that the unified identity information of a terminal is obtained by an authentication center; physical layer random authentication parameters are generated by the terminal and an access point; the physical layer random authentication parameters are reported to the authentication center by the access point; authentication data are generated by the authentication center through a root key of the terminal and the physical layer random authentication parameters, and the authentication data are transmitted to the terminal; the access point and the authentication center are authenticated by the terminal through the root key, the physical layer random authentication parameters and the authentication data of the authentication center, and terminal authentication data are generated and transmitted to the authentication center; the terminal is authenticated by the authentication center through the root key of the terminal, the physical layer random authentication parameters and the terminal authentication data; the physical layer random authentication parameters are simultaneously updated by the terminal and the access point, and continuous authentication is achieved. By means of the method, multi-party bidirectional identity authentication between various terminals and a heterogeneous network is achieved, and transparent transfer attacks of pseudo-base-stations and pseudo-terminals can be recognized and restrained.
Owner:THE PLA INFORMATION ENG UNIV

Display apparatus

The invention provides a display apparatus which comprises a display panel, a transparent cover plate and a fingerprint identification alarm circuit, wherein the transparent cover plate is arranged on the display panel; a full-screen fingerprint sensor is arranged on a first side, close to the display panel, of the transparent cover plate and is used for acquiring fingerprint information on the surface of a second side of the transparent cover plate; and the fingerprint identification alarm circuit is arranged on a first side of the transparent cover plate and comprises a receiving unit connected with the full-screen fingerprint sensor and used for receiving fingerprint information of the full-screen fingerprint sensor, an extraction unit connected with the receiving unit and used for extracting a fingerprint feature of fingerprint information obtained by the receiving unit, a comparison unit connected with the extraction unit and used for comparing the fingerprint feature obtained by the extraction unit with a pre-stored fingerprint feature, and an alarm unit connected with the comparison unit and used for performing alarm operation when the fingerprint feature obtained by the extraction unit is not matched with the pre-stored fingerprint feature. The display apparatus can realize automatic identity authentication of users in a normal use state.
Owner:BOE TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products