Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

211results about How to "Improve tamper resistance" patented technology

User public key address binding, searching and verifying method and system based on crypto currency open account book technology

The invention discloses a user public key address binding, searching and verifying method and system based on the crypto currency open account book technology. The user public key address binding, searching and verifying method is characterized by comprising the following steps that (1) verification public key addresses are published to users in a crypto currency network; (2) an account name registration request of one user is received, and the public key address of the user is received; (3) crypto currency is sent to the public key address of the crypto currency of the registered user through a private key address corresponding to the verification public key address and used as a verification transaction, and it is set that additional information or script content of the verification transaction contains the account number of the user, wherein the amount of the crypto currency is greater than or equal to zero; (4) query requests from other users in the crypto currency network are received, and the public key address of the registered user is fed back according to the query requests. The user public key address binding, searching and verifying method and system can substantially improve the availability, convenience, safety and reliability of crypto currency transactions, and protect the users against economic losses caused by the situation that the public key addresses are tampered with and used illegally.
Owner:安徽中科晶格技术有限公司

Slim terminal gaming system

A computer gaming system and method of operation thereof are provided that both drastically reduce the cost of gaming stations and allow contemporaneous access to multiple game programs from a single gaming station. The computer gaming system of the present invention allows for transparent modifications and upgrades to the gaming programs by executing gaming programs on a server / host computer connected to a plurality of client / terminal computers via communication pathways. Each client / terminal computer comprises a client / terminal program that allows input and output streams of the gaming program executed on the server / host computer to be separated and redirected to the client / terminal computers. Since the gaming programs are executed entirely on the server / host computer, with only wagering input and display output operations being executed on the client / terminal computers, the cost of the hardware and software required for each client / terminal computer is greatly reduced. A patron of a client / terminal computer can access any of the gaming programs executed on the server / host computer. Modifications and upgrades of the gaming programs only need to be performed on the server / host computer. By using a stereo head-mounted display together with a joystick input device and wireless communication pathways, the present invention allows a patron to participate in a mobile gaming environment.
Owner:NEW MILLENIUM GAMING

Lock cylinder fixed type crossed-shaped mechanical antitheft lock matched with fingerprint lock

The invention discloses a lock cylinder fixed type cross-shaped mechanical antitheft lock matched with a fingerprint lock and relates to the field of antitheft locks. By means of the characteristic that the operation manner that a key can only be inserted and pulled and unlocking can be conducted as long as a handle is rotated of the mechanical antitheft lock is right the same as the operation manner of the fingerprint lock is utilized, the scheme of matched usage of the mechanical antitheft lock and the fingerprint lock is put forwards. A cam mechanism of a special structure and double clutches running independently are mainly adopted so that fingerprint recognition unlocking, key unlocking and locking operation can be completed through the same handle, wherein the cam mechanism is mainly composed of a torque limiter, a driven ring, a cam ring and a stirring wheel in a combined manner, engagement and disengagement of the auxiliary clutch are completed through key inserting and pulling, and the main clutch and the auxiliary clutch are relatively independent and do not interfere with each other; and therefore convenience of the fingerprint lock is maintained in the whole set of lock, and meanwhile the beneficial effects that technical opening, violent opening and damage are prevented, the handle can idle, and a main lock plunger, a spring bolt and a lock body are movably connected in an external hanging manner of the mechanical antitheft lock are achieved.
Owner:BEIHUA UNIV

Method and device for managing secret keys in wireless sensor network

The invention discloses a method for managing secret keys in a wireless sensor network. The method comprises the following steps: 1. clustering the nodes of a sensor by adopting DECA (distributed energy-core algorithm) based on the spatial position information of the nodes, wherein a base station only communicates with cluster heads; the cluster heads communicate with the common nodes in the cluster; the cluster heads can not directly communicate with each other; and shared nodes do not exist among the clusters; and 2. during distributing the communication secret keys, adopting elliptic curve cryptography algorithm to encrypt and decrypt the wireless sensor network and carrying out communications among the nodes by utilizing a symmetric encryption method after establishing safe communication links. Dot multiplication of the elliptic curve cryptography algorithm is optimized by adopting a window sliding method to reduce the number of the continuous nonzero integers. By adopting the method, the safety of the wireless sensor network system can be remarkably improved. The invention also discloses a device for managing secret keys in the wireless sensor network. The device comprises a clustering module, a secret key management module and an elliptic curve cryptography algorithm optimization module.
Owner:BEIJING TOPSEC TECH

Double-insertion type antitheft door

The invention discloses a double-insertion type antitheft door and relates to the field of antitheft safety doors. The double-insertion type antitheft door is mainly characterized in that an insertion lug is arranged at the position, corresponding to each doorframe insertion hole, of a doorframe buckled edge, an insertion lug gap is formed between each insertion lug and a doorframe, a double-insertion plate is arranged at the position, closely neighboring a door leaf side edge, inside the door leaf, the double-insertion plate is provided with liner plates in the mode that each liner plate corresponds to the corresponding insertion hole in the doorframe, a narrow-slit type insertion hole is formed between each liner plate and the double-insertion plate, the side edge of a panel inside the door leaf is provided with rectangular insertion holes in the mode that each rectangular insertion hole corresponds to the corresponding narrow-slit type insertion hole, the insertion lugs, the door leaf side edge, the double-insertion plate and the liner plates are each provided with an insertion hole in the mode of corresponding to the doorframe insertion holes, the five insertion holes which are correspondingly formed constitute a group, after the door leaf is closed, the insertion lugs are inserted into the rectangular insertion holes and the narrow-slit type insertion holes, the double-insertion plate is also inserted into the insertion lug gaps, the five insertion holes are all coaxial, lock tongues are inserted into the five concentric insertion holes correspondingly and used for locking the antitheft door, and the double-insertion type antitheft door is resistant to unclenching and damage.
Owner:BEIHUA UNIV

Electric energy meter theft prevention sealing structure

The invention designs an electric energy meter theft prevention sealing structure which solves the technical problem of low productivity because the traditional electric energy meter seal is still manually operated. The electric energy meter theft prevention sealing structure comprises a meter shell and a meter body, wherein the meter shell is provided with a screw hole, and a screw is fixedly connected with the meter body after penetrating through the screw hole. The electric energy meter theft prevention sealing structure is characterized in that a seal cap with an outer folding edge at thelower part is arranged on the screw; a metal ring is sleeved outside the seal cap; the metal ring is abutted against the outer folding edge, and the outer wall is provided with a plurality of buckling pieces which are outwards inclined and opened to the upper part; the buckling pieces are circumferentially arranged; the inner wall of the surface shell arranged at the upper part of the screw hole is provided with an annular projection; and the buckling pieces are positioned at the lower part of the annular projection to form inversed buckling. The invention can visually find out damage traces and replace the damaged electric energy meter in time and has the advantages of good electricity theft prevention effect, high inversed buckling matching strength, good pickproof performance, convenience in processing, simplicity in sealing operation and high productivity.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products