Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

198results about How to "High security requirements" patented technology

Mobile phone telephone and message anti-disturbance and private communication method and system

InactiveCN101184264AImprove filtering effectOptimize the effect of anti-harassmentRadio/inductive link selection arrangementsSubstation equipmentPrivate communicationSocial statistics
The invention relates to a processing method and the system of anti-harassment of mobile phone calls and messages and private communication, which is as follow: when grouping the contacts in the mobile phone address list according to different classes, a private group of private communicating contacts is added, and different scene modes of the user are set; when receiving a mobile phone call or a message (text message, multimedia message), depending on the grouping sort of the contact of the incoming call or the message or the multimedia message, and the current scene of the user, together with the behavior characteristics of the harassing call and the spam message with the database information of the public harassing message issued by the authoritative institution or obtained from social statistics, the corresponding process to the call, the message and the multimedia message of the mobile phone is executed to reduce harassment; meanwhile the communication records of incoming, dialed calls and message, multimedia message with the contacts in the private grouping are encrypted and preserved to protect the personal privacy of the user. The invention has the advantages of adopting the operating steps of uniform process, and resolving synthetically the harassment of calls, messages and multimedia messages for the mobile phone and the private protection.
Owner:BEIJING NETQIN TECH

Method for cross-isomerism domain identity authentication and session key negotiation based on access authorization ticket

The invention provides a method for cross-isomerism domain identity authentication and session key negotiation based on an access authorization ticket. The method mainly comprises the steps that firstly, a first-level trust relationship is established between a CA of a PKI domain and an AS of a Kerberos domain through a distributed trust model based on a public key authentication mechanism; on the basis, the authorization ticket allowing an outer-domain user to have access to resources of the domain is generated and distributed by the CA or the AS united with a TGS, and through design of a two-way cross-domain authentication and key negotiation protocol based on a symmetric key cryptosystem, a second-level trust relationship allowing the outer-domain user to have access to the resources of the domain is established. On the premise that the requirements for safety of the levels are satisfied, the calculated amount and the communication traffic of a terminal are effectively reduced, public key encryption and decryption operations of a Kerberos domain terminal can be completely avoided, and the implementation is good in the cross-isomerism domain identity authentication process of a dynamic distributed type system, session key negotiation is completed when identity authentication is conducted, and the protocol efficiency is high.
Owner:四川华创智能科技有限公司

Valve controller based on ZigBee communication technology and control method thereof

The invention relates to a valve controller based on ZigBee communication technique and a control method, belonging to the water saving irrigation automatic control system, wherein the valve controller is composed of a adjustable power radio frequency and central control module, a valve control module, a water pressure acquisition feedback module, a project installment debugging module and a power supply unit, the power supply unit has three power supply paths while a 3.3V power supply is normally opened, a 5.5V power supply and a 500mA large current power supply controlling the switch of an electromagnetic valve can be turned off, the control center and the valve control nodes form a ZigBee net communication, the radio frequency is adjustable according to distance. The invention uses a working mode of integral awake and integral dormancy for the valve controller to switch the electromagnetic valve and feedback information. The invention has ultra low power consumption, can realize ZigBee communication after using a battery, and has high reliability, high safety, simple installment, simple debugging and intelligent water quantity measurement. The invention can give full play to the advantages of mulch drip irrigation technique and is beneficial for engineering realization.
Owner:CHENGDU WANJIANGGANGLI TECH

Main machine hall group arrangement method of nuclear power plant

The invention discloses a main machine hall group arrangement method of a nuclear power plant and relates to the technical field of nuclear power, and the main machine hall group arrangement method is used for solving the problem that an compact and efficient arrangement method capable of meeting enabling and non-enabling safety facility arrangement requirements, which is used for solving the reasonable equipment arrangement of a nuclear island plant does not exist in the prior art. The scheme provided by the invention is as follows: according to the main machine hall group arrangement method of the nuclear power plant, a main machine hall group comprises a nuclear island and a conventional island, and a nuclear island machine hall group comprises a reactor machine hall with a double-layer safety shell, an electric machine hall, a safety machine plant, a fuel machine hall, a nuclear auxiliary machine hall, a nuclear waste machine hall, an operation service machine hall, an emergency diesel generator machine hall and a nuclear-island fire-fighting water machine hall. According to the nuclear-island machine hall group arrangement method, a novel nuclear power plant single-pile arrangement structure is adopted and comprises an enabling and non-enabling combined safety system, has stronger capability of resisting severe external events, meets the requirement of a third-generation nuclear power technology, is beneficial to improvement on the safety of the whole nuclear power plant, and can be used for enhancing the nuclear safety acceptability of the public.
Owner:CHINA NUCLEAR POWER ENG CO LTD

Real-time night patrol system based on radio frequency identification technology

The invention discloses a real-time night patrol system based on radio frequency identification technology, which includes an RFID (radio frequency identification technology) night patrol point, an RFID night patrol club, a background server system and a monitoring and managing client, wherein an active RFID label is adopted to replace the night patrol point; and RFID label read-write equipment, a wireless data transmission module and a GPS positioning module are integrated in the RFID night patrol club. When the night patrol point is within the recognizable range of the RFID night patrol club, the RFID night patrol club can automatically collect the night patrol information, and transmits real time, geographic position and night patrol club information to the background server system through wireless data transmission technology; and the management staff knows the night patrol staff information in real-time through a monitoring and managing software by operating the monitoring and managing client, and issues a command through the background server system; as a result, the real-time property of the night patrol data and the accuracy in dispatching the night patrol staff are improved, and the problem that the data is delayed in the conventional night patrolling process is solved.
Owner:NINGBO TONGYI WULIAN TECH

System and method for realizing security storage and access control of data

The invention discloses a system and method for realizing the security storage and the access control of data. The system comprises an application server, a storage security gateway, a security strategy server and a backend storage system, wherein the storage security gateway is additionally arranged between the application server and the backend storage system so as to realize the partition, the isolation and the access control of data security domains. The storage security gateway and a storage virtualization gateway can synergistically work, and data can be stored in the manner of the security domains on an actual physical medium by utilizing a virtualization technique. When a data access request arrives at the storage virtualization gateway, the storage virtualization gateway can invoke the functions of the storage security gateway so as to realize the isolation and the access control of the data security domains. Because all data requests for access to the backend storage system can be processed by the storage security gateway, security control is guaranteed to be performed on the single path of data without being bypassed. In addition, security control is realized at the bottom layer of data access, so that attack means to data by upper application layers can be effectively avoided.
Owner:董唯元

Information transmission method, system and device

The invention discloses a method, a system and a device of information transmission for solving the problem existing in the prior art of comparatively poor security of information transmission. The method of information transmission, provided by the invention, includes the following steps that: after receiving an access request from a client, a server generates a virtual input device according to information of an actual input device of the client. Keys in the same positions of the virtual input device and the actual input device are corresponding with each other and at least a part of the keys which are in the same positions and used for users to input security information, represent different information; the server displays the virtual input device to the users by the client and receives the security information inputted by the user according to the virtual input device displayed by the client; the server transfers the received security information to obtain the security information according to the corresponding relationship between keys of the virtual input device and the actual input device. The method, the system and the device of the invention are used for the information transmission between the client and the server.
Owner:ALIBABA GRP HLDG LTD

Sea-gas coupled real-time observation buoy system based on Beidou satellite and Iridium satellite double-satellite communication

The invention discloses a sea-gas coupled real-time observation buoy system based on Beidou satellite and Iridium satellite double-satellite communication. The sea-gas coupled real-time observation buoy system comprises a sea-gas coupled observation sensor unit, a data collecting communication control unit, an anchoring unit, a buoy body platform, a power supplying unit and a data processing center. The buoy data collecting communication control unit adopts a Beidou satellite system to transmit conventional block method sea-gas flux, upper-layer sea current profile and buoy operation state parameters which have high requirements on data safety and low requirements on the communication quantity, and adopts an Iridium satellite system to transmit high frequency eddy related and high-resolution seawater skin surface temperature profile data which have high requirements on the communication quantity. A buoy can synchronously observe turbulence flux parameters of an eddy-related method of amovable platform, flux parameter of a block method, the seawater 0-1.0 m high-resolution skin surface temperature profile and the 0-70 m upper-layer sea current profile in real time in real time. Thesea-gas coupled real-time observation buoy system is suitable for being released in deep and open sea, and has the characteristics of diverse sea-gas interface observation parameter, safe data transmission and the like.
Owner:SOUTH CHINA SEA INST OF OCEANOLOGY - CHINESE ACAD OF SCI

Information security processing method and security processing apparatus

The invention provides an information security processing method and security processing apparatus applied to electronic equipment; a security application can be implemented on the electronic equipment; the information safe processing method comprises the steps of enabling the security application to be associated with a first sub application and a second sub application; adopting a first security mechanism for the first sub application while adopting a second security mechanism for the second sub application; after the electronic equipment receives an application running instruction, determining whether the second sub application is indicated by the application running instruction to be implemented or not; if the second sub application is indicated by the application running instruction to be implemented, adopting the second security mechanism to enable the second sub application to be implemented, wherein the first sub application is different from the second sub application; and the security level of the second security mechanism is higher than that of the first security mechanism. By adoption of the mobile terminal security payment scheme provided by the invention, the security of applications having high demand on security is ensured, and the convenience in use of applications having low demand on security is improved as well.
Owner:LENOVO (BEIJING) LTD

Pixel and DNA cross dynamic chaotic cipher-based image encryption method and device

The present invention relates to a pixel and DNA cross dynamic chaotic cipher-based image encryption method and device. The method comprises the following processing of ranking the pixels of a plaintext image to obtain a first index matrix, and carrying out the first chaotic coding on the plaintext image according to the first index matrix to obtain a first intermediate image; ranking the rows andthe columns of the first intermediate image separately to obtain a row index matrix and a column index matrix, and scrambling the first intermediate image according to the row and column index matrixes to obtain a second intermediate image; converting each pixel in the second intermediate image into a 4-base DNA sequence, selecting eight kinds of coding rules satisfying a Watson-Crick complementrule according to the second chaotic coding, adopting the above eight kinds of coding rules to carry out the complementary DNA coding on each DNA sequence in the second intermediate image to obtain athird intermediate image, and then carrying out the DNA subtraction, add operation and xor operation on the third intermediate image to obtain a fourth intermediate image; carrying out the adjacent DNA coding on the fourth intermediate image to obtain a final ciphertext image.
Owner:SHANDONG ZHENGZHONG COMP NETWORK TECH CONSULTING

Permission validation system and permission validation method for safety production comprehensive supervision

The invention relates to the technical field of supervision systems and discloses a permission validation system and a permission validation method for safety production comprehensive supervision. The permission validation system comprises a client and a server side, wherein the client is communicated with the server side by a plurality of front-end processors through the Internet; each front-end processor of the client is provided with a user login end module and a service operation end module; the server side is provided with a login permission validation module and a service operation validation module which are correspondingly communicated with the user login end module and the service operation end module of each front-end processor through the Internet; an Internet communication protocol of the client and the server side is the HTTP (Hyper Text Transport Protocol). According to the permission validation system and the permission validation method, permission validation can be carried out on the access request each time; when a user accesses a server through the Internet, an address of a user request is obtained and is compared with a user permission information database; when the permission passes, the request is permitted; when the permission does not pass, the request is returned back; the permission validation system is flexible and strong in expandability.
Owner:LUOYANG HONGZHUO ELECTRONICS INFORMATION TECH

An image interpolation space completely reversible separable ciphertext domain information hiding algorithm

The invention provides an image interpolation space completely reversible separable ciphertext domain information hiding algorithm. The method comprises the following steps of: giving out a conditionrequired by a traversal matrix suitable for image encryption, constructing the traversal matrix by utilizing a chaotic pseudo-random number generator, carrying out a decryption algorithm of the traversal matrix and diffusion and restoration of pixels, generating an encrypted image and realizing secret information hiding in an encrypted image interpolation space; according to the invention, the matrix is traversed;, pixel diffusion and interpolation hiding can realize confidentiality of a carrier image and a secret image. The distribution of a ciphertext image histogram and a secret carrying image histogram is uniform. The image is flat, and a decoder cannot obtain the original image and the secret key information from the histogram; Attacks such as statistical characteristics of the plaintext image are well defended. The security requirement of the carrier image is met, meanwhile. The original image can be restored in a lossless mode, secret information can be extracted, watermark extraction and image decryption are independent, completely separated and exchangeable, and the method has the advantage of being high in security.
Owner:王继军 +1

Cryptography attribute-based access control method and system based on dynamic rule

The invention relates to a cryptography attribute-based access control method and system based on a dynamic rule, mainly belonging to the technical field of information. In the cryptography attribute-based access control system based on the dynamic rule, protected objects are stored in a encrypted form, and only the requests satisfying the requirements of access policies in the attribute-based access control can be authorized to decrypt the objects, therefore, it can be ensured that data in an unsafe environment can be accessed with authorization according to a security policy, and meanwhile,the extensibility of the policies and the dynamic acquisition of the attributes are also supported. The cryptography attribute-based access control method and system based on the dynamic rule are divorced from the traditional encryption system framework, and are a new attribute-based access control model, method and system supporting the cryptography decision. The cryptography attribute-based access control method and system based on the dynamic rule can achieve more secure, diversified, dynamic and flexible access authorization, which are suitable for large-scale organizations or informationsystems, and can be applied to the environments such as cloud computing, grid computing, distributed computing, and so on.
Owner:UNIV OF SCI & TECH BEIJING

Visible-code-based payment method and system with multiple security combination mechanisms

The invention relates to a visible-code-based payment method and system with multiple security combination mechanisms, wherein the visible code is a two-dimension code or a bar code or a character code or combination of the two-dimension code, the bar code and the character code. The visible-code-based payment method and system with the multiple security combination mechanisms is characterized in that on the basis of an existing transaction payment system (such as an Internet channel, a mobile intelligent client terminal, an ATM, a POS and a counter), payment card information used for authentication during transaction payment is generated in a self-service mode in a card issuing bank/card issuing mechanism system by a cardholder, the payment card information at least comprises a payment card number, personalized welcomes, an acquiring bank identification code, a commercial tenant name, a commercial tenant code, a card acceptor terminal identification code, an actual validity period, a one-time/multi-time card, a service code/service constraint, a CVN, a personal identification code, a dynamic verification code receiving number, the allowed retyping frequency, a transaction money code, limit amount, cardholder identity authentication information (such as the cardholder identification numbers, fingerprints, a digital certificate and a seal impression) and the like, the payment card information is used as the basis of the multiple security combination authorization mechanisms, and the payment card numbers can be applied to the transaction payment method and system through the visible code (such as the two-dimension code, the bar code, the character code and the combination of the two-dimension code, the bar code and the character code).
Owner:闻进

Asymmetric FHE (Fully Homomorphic Encryption) method and secret key substitution and cipher text delivery methods thereof

The invention relates to an asymmetric FHE method and secret key substitution and cipher text delivery methods thereof. A private key and a public key are generated randomly, and the secret key is used to generate an operation support function, a unit cipher text of secret key encryption and a public key encryption operation support function; a plaintext is encrypted to generate a cipher text, namely, the secret key is used for encryption directly to obtain a direct cipher text, or the public key corresponding to the secret key is used to carry out encryption operation to obtain a compatible cipher text in the same secret key space; and when the cipher text needs to be delivered to the receiving end safely, the sending, receiving and server ends or the sending and receiving ends complete delivery of the cipher text. Operation of the cipher text is carried out directly without leakage of the plaintext, a safe data storage and operation environment is provided, the computing speed is improved substantially compared with the prior art, the required cipher text volume and expansion speed are lower, the methods can be realized in different manners, and a data owner can use different cloud computing services needless of worrying about leakage of sensitive and secrete data.
Owner:上海麟羿信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products