Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

129results about How to "Improve security and confidentiality" patented technology

Local area network-based network examination system and implementation method thereof

The invention discloses a local area network (LAN)-based network examination system and an implementation method thereof. The LAN-based network examination system adopts a client/server (C/S) mode framework; an examination room server, an examination affair operating terminal and examinee operating terminals form a local are network; and examination test questions in the examination room server are decrypted by the examination affair operating terminal and then converted into a data format which can be identified by the examinee operating terminals. The examination affair operating terminal classifies and collects data files of problems worked by examinees and archives examination data. The examinee operating terminals display the identified data and provide an examination environment for examinees. The LAN-based network examination system has lower requirements on network and hardware configurations, stronger adaptability and high compatibility, and only each examinee operating terminal is communicated with a twisted pair cable and is connected with each other by using an exchanger to form the local area network, thereby greatly saving the input of network equipment. The examination data are transferred in the local area network and has no physical contact with the internet, thereby guaranteeing data security and stability of the examination system.
Owner:KUNMING METALLURGY COLLEGE

System and method for fingerprint encryption and decryption

A system for fingerprint encryption and decryption comprises a sending terminal and a receiving terminal, wherein the sending terminal and the receiving terminal are provided with fingerprint identifying devices. The sending terminal comprises a collection module used for collecting user fingerprints and recording time when the user fingerprints are collected, the sending terminal is used for judging whether continuous time of collection of the user fingerprints exceeds a preset first time range, if yes, a first judging module of a preset encryption option, and an encryption module are called out, and the encryption module is used for encrypting information or files or folders needing to be sent to the receiving terminal by means of collected user fingerprints through the encryption option. The receiving terminal comprises a collection module, a comparing module and a decryption module, wherein the collection module is used for collecting the user fingerprints, the comparing module is used for comparing prestored user fingerprints and the user fingerprints collected by the collection module in real time, and the decryption module is used for decryption. The system effectively utilizes fingerprints to encrypt communication data, and can avoid the facts that memorization of passwords causes using inconvenience, or the passwords are stolen to cause problems of information safety and the like.
Owner:DISKON INFORMATION SCI & TECH SHANGHAI

Method and system for authorizing to acquire terminal attack alarming information log

The invention provides a method and a system for authorizing to acquire a terminal attack alarming information log and belongs to the technical field of communication. The method for authorizing to acquire the terminal attack alarming information log comprises the following steps: after acquiring an authentication account of an attack alarming information log authority by a server, authenticating the legitimacy of a client tool by the server; after the legitimacy passes, sending second data to be authenticated to the client tool by a terminal and sending the data to the server by the client tool; if the authentication of the server on the second data to be authenticated passes, encrypting the second data to be authenticated to generate second authentication data and sending the second authentication data to the terminal; if the authentication of the terminal on the second authentication data passes, acquiring the attack alarming information log by the terminal and encrypting the attack alarming information log; and after encrypting, sending the attack alarming information log to the client tool. A whole process adopts double-factor authentication and ensures the safety; and an instruction of acquiring the terminal attack alarming information log by the terminal is a legal behavior approved by the client and the legitimacy of acquiring an operation instruction is ensured.
Owner:FUJIAN LANDI COMML EQUIP CO LTD

Communication system and method for improving security performance of physical layer by energy station

The invention relates to a communication system and method for improving the security performance of a physical layer by an energy station. The communication system comprises a source node, a legitimate receiving node, an eavesdropping receiving node and the energy station; the energy station is equipped with N antennas, the source node is equipped with M antennas, and the legitimate receiving node and the eavesdropping receiving node are equipped with a single antenna respectively; the energy station and the source node constitute a wireless energy transmission subsystem; the source node and the legitimate receiving node constitute a wireless signal transmission subsystem; the energy station, the legitimate receiving node and the eavesdropping receiving node constitute a wireless interference signal transmission subsystem; and the energy station is provided with a beamformer w. The invention further relates to a method for improving the security performance of the physical layer by the energy station. The energy station can not only serve as a terminal to provide energy for the source node, but also can serve as an interference source and transmit a wireless interference signal, and the wireless interference signal generates relatively large interference to the eavesdropping receiving node, so the security performance of the physical layer is greatly improved.
Owner:ZHEJIANG UNIV

Biological feature information management method and system

The invention relates to a biological feature information management method and system. The method comprises the steps of obtaining a fingerprint image which is input by a user and is used for carrying out identity authentication; identifying whether the user is a legal user or not according to the fingerprint image and a preset fingerprint template; if the user is the legal user, collecting a finger image of the user according to a preset sampling frequency; judging whether the finger image is the finger image of a living body or not according to a preset living body detection rule; and determining whether the identity authentication is successful or not according to a living body identification result. According to the embodiment of the method and the system, through collection of the fingerprint image, whether the user is the legal user or not is identified, through collection of the finger image of the user, whether a finger of the user carrying out press operation is a living body finger or not is determined, so the problem that an illegal user disguises as the legal user through utilization of disguise technologies such as fingerprint membrane and steals the biological feature information of the user is solved, and the security and confidentiality of the biological feature information management system are improved.
Owner:SHENZHEN CHIPSAILING TECH CO LTD

Unlocking method based on mobile terminal and mobile terminal

The invention discloses an unlocking method based on a mobile terminal and the mobile terminal. The method comprises that an unlocking interface is displayed on a screen of the mobile terminal, wherein the unlocking interface comprises a rotatable three-dimensional figure; a user's slide operation on the current display interface of the three-dimensional figure is detected, and unlocking points which are passed by the user's slide and corresponding to the current display interface are recognized according to an execution sequence of the slide operation; whether the recognized unlocking points are matched with a preset three-dimensional unlocking password is judged; and if the recognized unlocking points are matched with the preset three-dimensional unlocking password, the three-dimensional figure will be rotated and above operations are repeated until the user completes the slide operations of all the display interfaces of the three-dimensional figure, and the mobile terminal is finally unlocked. By the manner, the mobile terminal is unlocked easily and quickly, and safety and confidentiality of unlocking are increased because the unlocking method provided by the invention is based on the three-dimensional figure.
Owner:HUIZHOU TCL MOBILE COMM CO LTD

Method and system for safely sending out data

The invention relates to a method for safely sending out data. The method comprises the following steps: dividing electronic file data of a user into a plurality of confidentiality levels according touser attributes and respectively storing the confidentiality levels by different storage media; configuring outgoing strategies for the electronic file data according to different confidentiality level labels marked on the electronic file data; carrying out electronic file data outgoing detection; when it is detected that the electronic file data is sent out, confirming the sending-out permissionof the electronic file data; when the user has the outgoing permission, carrying out the outgoing operation according to the corresponding outgoing strategy; when the confidential electronic file data has a leakage risk, utilizing the bound outgoing security software to automatically delete and destroy the electronic file data. According to the method, the problems of poor timeliness, poor security and confidentiality, inflexible file data receiving and sending operation and the like of file data sending in the prior art are solved, the whole process is simple, rapid and flexible, complex sending approval is not needed, and the security and confidentiality of the electronic data sending process are enhanced. The invention further relates to a system for safely sending out the data.
Owner:北京泰立鑫科技有限公司

Electromagnetic wave data transmission rule and system

ActiveCN109217914AIncrease the range of referentialityIncrease the number of launchesRadio transmissionSatellite antennasInterference (communication)
The invention discloses an electromagnetic wave data transmission system, which includes terrestrial master information node, communication satellite, relay satellite, uplink control carrier, relay satellite antenna unit, the ground main information node is connected with the outside through the wired broadband, A main information node on that ground is connected with a communication satellite through a relay satellite, A telecommunication satellite includes a telecommunication satellite service area, The communication satellite is respectively connected with a mobile terminal and a ground data aggregation node, wherein the mobile terminal and the ground data aggregation node are arranged in the service scope of the communication satellite, the mobile terminal comprises a data aggregationnode, and the ground data aggregation node is arranged in the service scope of the ground data aggregation node; The invention not only reduces the upgrading requirement of the terrestrial wireless digital base station, but also reduces the application requirement of the wireless spectrum bandwidth. And avoid the problem of interference cancellation of electromagnetic wave peak and valley, and further increase the number of electromagnetic wave serial emission per unit time.
Owner:XUZHOU SPACE TIME THOUGHT INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products