Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

250results about How to "Improve storage security" patented technology

Identification analysis system implementation method based on blockchain technology and identification coding technology

The invention discloses an identification analysis system implementation method based on a blockchain technology and an identification coding technology. The method comprises the following steps: A, establishing a consensus node mechanism; B, carrying out on-chain deployment by utilizing an intelligent contract technology so as to guarantee an identification rule; cC generating a data tree management mode for producing a full link based on a distributed account book technology; D, establishing a component model; E, querying the component model; if a result is inquired, directly entering the step G, otherwise, entering the step F; F, performing intercommunication analysis of the identification system; and G, outputting identification information. According to the method, the management efficiency of the identification data can be effectively enhanced, identification codes are unified, the method is unified with the construction of a national identification analysis system, the identification information management of all elements and all links of an industrial internet identification analysis ecosphere is realized, and an interconnected and intercommunicated data ecological chain isformed between the method and other identification systems.
Owner:SICHUAN CHANGHONG ELECTRIC CO LTD

Refrigerator

The invention relates to a refrigerator which comprises a refrigerator body. A refrigerating chamber is arranged on the upper portion of the refrigerator body, and a freezing chamber is arranged on the lower portion of the refrigerator body. A refrigerator door mounted on the refrigerator body comprises an inner door and an outer door. The inner door and the outer door form the refrigerator door which is of a double-layered door structure. When the refrigerator door is closed, the inner door is positioned in the refrigerator, the outer door facing users enables the users to open the refrigerator body, the inner door and the outer door are in rotating or sliding connection, and the outer door and the refrigerator body are in rotating connection. A plurality of special storage devices and lighting devices are arranged in the refrigerator body, the refrigerating chamber and the freezing chamber according to stored objects. The refrigerator is simple in structure and convenient to use, food can be effectively stored according to different packages or cleanliness, neatness and convenience levels of the food, the problems like scattering and odor tainting of the food or food materials are avoided, safety and convenience in storing of the food or the food materials are improved, and the refrigerator is in conformity with use habits of users.
Owner:GUANGDONG CANBO ELECTRICAL

Distributed file storage method and system based on block chain

The invention relates to the technical field of block chains, and discloses a distributed file storage method and system based on a block chain, and the method comprises the steps: meta-information ofa to-be-uploaded file carried in a file uploading request is acquired when a coordination server detects the file uploading request of a client, a coordination server obtains the file size of the to-be-uploaded file from the meta-information, formulates a corresponding fragmentation strategy according to the file size, generates a file identification code according to the meta-information, and sends the fragmentation strategy and the file identification code to a client; and the client performs fragmentation processing on the to-be-uploaded file according to the fragmentation strategy and thefile identification code to obtain fragmentation data, and uploads the fragmentation data to a block chain node corresponding to the storage server for storage so as to realize distributed storage ofthe file. Potential safety hazards caused by the fact that the to-be-uploaded file is stored in the third-party server in the prior art are avoided, the storage pressure of the storage server is reduced, and the file storage efficiency and the storage safety are improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Modularized intelligent terminal implementation method

The invention discloses a distributed intelligent Internet of Things with high flexibility. The distributed intelligent Internet of Things comprises a public and private cloud service, a general control module, an intelligent module, an intelligent module expansion module, a function module and a function module peripheral, which are networked and connected in a flexible manner, so that owning and maintenance costs are reduced, the rapid deployment of the service is achieved, more application requirements are met by convenient combination. According to the distributed intelligent Internet of Things with high flexibility, through the definition of an standard interface, the flexible networking is achieved, the cost for primarily owning by a user is reduced, and the cost for subsequently required expansion is also reduced; through the convenient cloud service, each module is convenient to upgrade and maintain, and the maintenance cost is lowered; through the convenient, safe and economical cloud storage, the safe historic recording of key data can be achieved; through the developed network, convenient use is achieved at any time and any place; through the expansion of the function module, the deployment with the requirement of low cost is achieved; through the expansion of the intelligent module, the cost ratio of the intelligent module is reduced.
Owner:范伟飞

Authentication method, unlocking method and unlocking system for dynamic password lock

The invention provides an authentication method, an unlocking method and an unlocking system for a dynamic password lock. The authentication method comprises the following steps: setting a third algorithm corresponding to a first algorithm and a fourth algorithm according to a second algorithm in a hand-held terminal for unlocking the dynamic password lock; generating a first authentication sequence on the hand-held terminal side by use of a first key number set through the third algorithm, and generating a second authentication sequence through a second key number set received from the dynamic password lock through the fourth algorithm; generating a fourth authentication sequence on the dynamic password lock side through the second key number set of the current side through the second algorithm, and generating a third authentication sequence through a first key number set received from the dynamic password lock through the first algorithm; and carrying out corresponding steps, and determining that the authentication is passed in the case that the first and the third authentication sequences are correspondent and the second and the fourth authentication sequences are correspondent. By adopting the authentication method provided by the invention, the security performance of the dynamic password lock can be improved.
Owner:SGSG SCI & TECH CO LTD

Sample storage library and sample storage method

PendingCN111332768ARealize fully automatic storageNo human intervention requiredConveyor partsProcess engineeringManipulator
The invention discloses a sample storage library and a sample storage method. The sample storage library comprises a sorting library and a storage library, wherein the sorting library is internally provided with a temporary storage rack, a scanning device, a test tube capping device, a test tube recycling device, a second manipulator and a third manipulator; and the storage library is internally provided with a storage rack and a fourth manipulator, and the storage library communicates with the sorting library. When test tubes are put in storage, the second manipulator conveys the test tubes to be put in storage to the scanning device for scanning, the test tube capping device caps the test tubes which are correctly scanned, the third manipulator conveys the capped test tubes to the temporary storage rack, and after the test tubes are placed on the temporary storage rack for a period of time, the test tubes are conveyed to the storage rack under the action of the third manipulator andthe fourth manipulator; and after the test tubes are placed on the storage rack for a period of time, the test tubes to be recycled are conveyed to the test tube recycling device under the action of the third manipulator and the fourth manipulator. Manual intervention is not needed in the warehousing, ex-warehousing, capping and recycling processes of the samples, full-automatic storage of the samples is achieved, and the test tube storage efficiency is improved.
Owner:QINGDAO HAIER BIOMEDICAL TECH CO LTD +1

Information integrity measurement verification method and system for satellite-borne computing system

The invention discloses an information integrity measurement verification method and system for a satellite-borne computing system. The method comprises the following steps: S1, establishing a trust chain in a whole starting sequence; taking the integrity trust module as a starting point, carrying out integrity measurement and local verification on the next object in the starting sequence on the premise of trusting the current object, considering that the next object is credible after the local verification is passed, transferring the control right to the next object, and sequentially pushingbackwards until the object in the whole starting sequence completes the local verification; S2, in the running process of the system, conducting integrity measurement and local verification on the data in the memory; and when the ground system sends a task to the satellite-borne computing system, carrying out data transmission after remote verification is passed. Safety measures are taken from thebottom layers of hardware and software of the satellite-borne computing system, measurement and verification of the system and key applications are increased, tampering attacks and the like can be better resisted, and the integrity and authenticity of platform codes and data can be verified.
Owner:中国星网网络应用有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products