Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

203results about How to "Improve the level of security protection" patented technology

Communication message security interaction method and device of distribution automation system

The invention provides a communication message security interaction method and a device of a distribution automation system. After completing two-way identity authentication between a distribution master station and a distribution terminal, a main distribution station obtains distribution terminal information from the distribution terminal. The main distribution station judges whether that distribution terminal is the first identity authentication according to the version number of the symmetrical key of the distribution terminal, if not, the message exchange between the distribution terminaland the main distribution station is carried out; otherwise, after the symmetric key of the distribution terminal is updated, message exchange between the distribution terminal and the distribution master station is performed. The scheme makes up for the shortcomings that the distribution master station can not identify the distribution terminal in the distribution automation system security protection system, and the confidentiality and integrity of the communication message can not be guaranteed, and improves the security protection level of the vertical communication between the distribution master station and the distribution terminal in the distribution automation system. At that same time, the problem that the remote control / parameter set message has the hidden trouble of the replayattack and the like are sol.
Owner:CHINA ELECTRIC POWER RES INST +1

Industrial control system terminal safety protection method

The invention belongs to the technical field of industrial control system terminal safety protection, and particularly relates to an industrial control system terminal safety protection method. The method is implemented based on an industrial control system terminal safety protection system, and the system comprises terminal safety protection equipment and a terminal safety centralized managementsystem. According to the scheme, a series of technical means of strong identity authentication, dual access control, an interface protection strategy, file deep analysis, security audit and equipmentcentralized management are comprehensively applied; malicious behaviors such as network attack and illegal access in operation of industrial control system equipment are effectively blocked, and centralized configuration and management of security protection strategies of a plurality of industrial control system equipment terminals of the same type or different types are realized at the same time.The scheme has the advantages that the safety protection level of the industrial control equipment terminal is high, centralized and unified management of multiple pieces of equipment is supported, and the centralized management platform is suitable for multiple application environments and multiple industrial protocols, good in compatibility, flexible in protection strategy configuration, efficient in alarm reporting and equipment management and the like.
Owner:北京京航计算通讯研究所

Fluorescent inflaming-retarding multifunctional double-layer fabric and preparing method thereof

The invention discloses a fluorescent inflaming-retarding multifunctional double-layer fabric. The surface layer of the fabric is woven from inflaming-retarding yarn capable of being dyed with fluorescence color, and the inner layer of the fabric is woven from non-melting inflaming-retarding yarn incapable of being dyed with fluorescence color. The warps of the inner layer are lifted to be interwoven with the wefts of the surface layer to form a binding texture so that the two layers can be connected. The fabric is prepared in the way that the warps of the inner layer are lifted to be interwoven with the wefts of the surface layer to form the binding texture so that the two layers can be connected, and then dyeing treatment is conducted to generate the fluorescent inflaming-retarding multifunctional double-layer fabric. Specifically, the two layers of the fabric are connected in the way that when surface wefts are put in for surface layer weaving, all inner warps must sink to the space below a shed and can not be interwoven with surface wefts; when inner wefts are put in for inner layer weaving, all surface warps must be lifted and can not be interwoven with inner wefts. The double-layer fabric can have different spaces and can be used for making protection garments in a plurality of fields.
Owner:SHAANXI YUANFENG TEXTILE TECH RES

Waterproof and dustproof structure of outdoor equipment cabinet and outdoor equipment cabinet with waterproof and dustproof structure

The invention discloses a waterproof and dustproof structure of an outdoor equipment cabinet and the outdoor equipment cabinet with the waterproof and dustproof structure. According to the waterproof and dustproof structure of the outdoor equipment cabinet and the outdoor equipment cabinet with the waterproof and dustproof structure, more than two ventilation holes are vertically formed in one lateral wall of a cabinet body at intervals, a louver is arranged outside each ventilation hole in a covering mode, an air duct is arranged between each ventilation hole and a corresponding louver in an enclosing mode, each louver is provided with vertically arranged openings which are lower than a corresponding ventilation hole, and the lower edge of the bottommost opening of each louver is flush with the lower wall surface of a corresponding air duct. The outdoor equipment cabinet with the waterproof and dustproof structure is simple in structure. According to the waterproof and dustproof structure of the outdoor equipment cabinet and the outdoor equipment cabinet with the waterproof and dustproof structure, the service life of the equipment cabinet is effectively prolonged, electrical equipment installed in the equipment cabinet is made to rotate in a sound internal environment all the time, the level of safety protection of the outdoor equipment cabinet is further improved, and the problem that drainage is unavailable at interlayer positions of an air inlet and an air outlet of an existing equipment cabinet is solved.
Owner:STATE GRID CORP OF CHINA +2

Universal type automatic-butt-joint charging apparatus applicable to indoor mobile robot

ActiveCN106786882AReduce the precision requirements for docking operationsLow costElectric powerExchanging data chargerMobile robotSingle degree of freedom
The invention discloses a universal type automatic-butt-joint charging apparatus applicable to an indoor mobile robot, and belongs to the technical field of a robot. The universal type automatic-butt-joint charging apparatus comprises a fixed charging station and an automatic charging accessory mounted on the mobile robot, wherein the fixed charging station comprises a charging butt-joint system, a control system, a wireless communication module A, a butt-joint state detection system and a power supply system; and the automatic charging accessory comprises a battery electric quantity monitoring module, a wireless communication module B and a charging base. After the automatic charging accessory is connected with the control system and a charging battery system of the mobile robot, automatic-butt-joint charging is realized by executing the respective programs at the mobile robot end and the fixed charging station end; the charging butt-joint system can realize butt jointing/separating actions with the charging base through an electric push rod in movement of single degree of freedom; and the butt-joint state detection system judges the state of the butt-joint system through voltage detection.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Mimicry switch judgment system and method based on trusted measurement

The invention belongs to the technical field of network security, and discloses a mimicry switch decision system based on trusted measurement, and the system comprises a forwarding plane, a managementinterface agent, an intermediate adaptation module, a forwarding plane agent, a plurality of heterogeneous actuators, a trusted measurement-based mimicry decision module and a situation awareness andnegative feedback scheduling module. The invention further discloses a mimicry switch judgment method based on trusted measurement. The mimicry switch judgment method comprises the steps: setting mimicry switch judgment elements; distributing input information; collecting output information; carrying out mimicry decision based on credibility measurement; issuing a judgment result, sensing the threat situation of the switch, and scheduling an executor; the mimicry decision based on credibility measurement comprises the following steps: establishing an executive credible index tree; collectingand updating the credible index data of the executive body; calculating the credible weight of the output result of each executive body; and calculating the credibility of each output result. The method can effectively reduce the influence of unknown loopholes and potential backdoors, and improves the safety protection level of a local area network.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Full-face intelligent fire fighting helmet

InactiveCN104970477AWith communication functionHas a wide-angle visual field of viewHelmetsHelmet coversEyepieceDisplay device
A full-face intelligent fire fighting helmet comprises a helmet main body and transparent goggles positioned in the middle of the front face of the helmet main body; a thermal imaging camera and a low-light-level night vision camera are disposed over the goggles side by side, the thermal imaging camera and the low-light-level night vision camera are embedded into the helmet main body, a row of laser light-compensating lamps are disposed over the thermal imaging camera and the low-light-level night vision camera, and the laser light-compensating lamps are also embedded into the helmet main body; an upper portion of the inside of the goggles is provided with a display used when fire scene ambient conditions cannot be seen clearly in the view, temperature T degree distribution of the fire scene can be displayed, and display information can be transmitted to a background command vehicle system timely; and a lower portion of the inside of the goggles is provided with a respirator, the respirator is connected with an external breathe supply system, and a hands-free communication system for ensuring clear communication between fire fighters and between the fire fighter and a superior is disposed below the respirator side in the goggles. The helmet is high in safety protection degree and maximum service temperature, long in service lifetime, small in size, light in weight and easy to handle, and can continuously work for a long time.
Owner:SHANGHAI KEQIN ELECTRICAL MACHINE

Keyboard safe protecting device and method of payment terminal

ActiveCN103617908AImprove the level of security protectionImplement cross-interlock protection mechanismElectric switchesComputer hardwareEmbedded system
The invention provides a keyboard safe protecting method of a payment terminal. Two sets of independent safe network detection signals are output through a safe processor of the payment terminal in a driving mode, the signals pass through two sets of safe network detection contacts on the periphery of a keyboard PCB, two sets of the same corresponding safe network detection contacts on a dome FPC protecting film and two layers of corresponding network cables, and constitute an access through extrusion of a limiting column in a matched mode, the two sets of safe network detection contacts on the periphery of the keyboard PCB are arranged in a crossed mode, and the two sets of the same corresponding safe network detection contacts on the dome FPC protecting film are arranged in a crossed mode, the detection signals are fed back to a safe detection input circuit of the safe processor, and therefore safety of a keyboard is guaranteed through cross interlocking of the safe detection signals. The invention further provides a keyboard safe protecting device of the payment terminal, a safe protection mechanism of cross interlocking can be achieved, equipment is safer by means of safe network detection and safe switch detection, and the keyboard safe protection grade of the payment terminal is improved.
Owner:FUJIAN XINO COMM TECH

Wireless local area network non-perception control method and system and readable storage medium

The invention relates to a wireless local area network non-perception control method and system and a readable storage medium. The method comprises the steps that a wireless gateway receives access request information; the wireless gateway generates MAC address query information according to the access request information; the MAC address query information is sent to a Portal server; the Portal server queries whether the MAC address information is recorded or not; and if the MAC address information is recorded, authentication success information is returned to the wireless gateway, and a wireless link of an access address is established. According to the invention, the authentication information is automatically authenticated in the secondary login process of the user; on one hand, the management level and the information security protection level of the wireless local area network are enhanced; on the other hand, the problem of non-perception authentication is solved through binding of AD domain accounts, so that the authentication process of the user is simplified, the use experience of the user is improved, a better wireless local area network service is provided for the user, and the user can use the wireless local area network service more conveniently, quickly and freely.
Owner:GUANGDONG URBAN & RURAL PLANNING & DESIGN INST

IC (Integrate Circuit) card access terminal adopting commercial cipher and operation method thereof

The invention relates to an IC (Integrate Circuit) card access terminal which adopts a commercial cipher and is provided with a commercial SM (Smart Media)7 / SM1 cipher module. The IC card access terminal comprises an antenna, an RF (Radio-Frequency) interface, an MCU (Microprogrammed Control Unit), a cipher module with a commercial cipher algorithm, an access executing mechanism and a data interface connected with a background monitoring system, wherein the MCU is respectively connected with the RF interface, the cipher module, the access executing mechanism and the data interface for data interaction, and the RF interface is connected with the antenna and is in charge for RF communication between the MCU and the IC card. An operation method of the invention comprises the following steps of: (1) swiping a card on the induction antenna of the access terminal by a user; (2) carrying out SA (Social Accountability) authentification on the access terminal and the IC card under the matched control of the MCU and the SM7 / SM1 cipher module; (3) carrying out SB authentification; (4) authenticating user release information; (5) controlling access; and (6) reporting a legal access accident to the background monitoring system. The invention has a commercial cipher secured authentification mechanism and effectively ensures the security of important access.
Owner:上海微通电子设备有限公司

Encrypted data storage system based on key other-place storage and method

The invention discloses an encrypted data storage system based on key other-place storage and method. The encrypted data storage system based on key other-place storage comprises a key control center,a key other-place storage system and a data encryption and decryption storage system, wherein the key other-place storage system comprises a first key control device, a key storage device and a firstquantum key distribution device; the data encryption and decryption storage system comprises a second key control device, a data encryption and decryption storage device and a second quantum key distribution device; the first quantum key distribution device and the second quantum key distribution device are in quantum communication connection; the first key control device is in communication connection with the key storage device and the first quantum key distribution device respectively; and the second key control device is in communication connection with the data encryption and decryptionstorage device and the second quantum key distribution device respectively. The key other-place storage system and the data encryption and decryption storage system can be separated at any distance safely and reliably, and other-place separate and safe storage between encryption and decryption keys and data can be realized.
Owner:ANHUI QASKY QUANTUM SCI & TECH CO LTD

Industrial control system terminal safety protection system

The invention belongs to the technical field of safety protection of industrial control system terminals and particularly relates to an industrial control system terminal safety protection system. Theindustrial control system terminal safety protection system comprises a terminal safety protection device and a terminal safety centralized management system. According to the scheme, a series of technological means of strong identity authentication, double access control, an interface protection strategy, file depth analysis, safety audit and equipment centralized management are comprehensivelyapplied, so that malicious behaviors such as network attack, illegal access and the like during operation of the industrial control system equipment are effectively blocked, and meanwhile, centralizedconfiguration and management on safety protection strategies of a plurality of industrial control system equipment terminals of the same type or different types can be realized. The scheme has the advantages that the safety protection level of the industrial control equipment terminal is high, the centralized and unified management of multiple equipment is supported, the centralized management platform is suitable for various application environments and multiple industrial protocols, the compatibility is good, adding and deleting of the equipment is simple, configuration of the protection strategies is flexible, alarm reporting and equipment management are efficient, and the like.
Owner:北京京航计算通讯研究所

Real-time flow monitoring and abnormity early warning system and method for wireless internet of things

The invention relates to a real-time flow monitoring and abnormity early warning system and method for wireless internet of things; the system is technically characterized by comprising a plurality ofmonitoring nodes, boundary equipment and an upper computer, wherein the output ends of the monitoring nodes are sequentially connected and are used for monitoring and collecting the data traffic of the wireless internet of things in real time; the output ends of the monitoring nodes are respectively connected with the boundary equipment and are used for outputting the data traffic of the wirelessinternet of things detected by the monitoring nodes to the boundary equipment in real time; the output end of the boundary equipment is connected with the upper computer and is used for outputting the data flow of the wireless internet of things to the upper computer through the boundary equipment and for performing real-time on-line analysis and processing on the data traffic of the monitored wireless internet of things. According to the system and method, online real-time analysis processing of the network traffic of the wireless internet of things can be realized, network abnormity and malicious intrusion events of the wireless internet of things can be found in real time, and the system and the method have important significance for guaranteeing the system integrity and the information safety of the wireless internet of things.
Owner:ELECTRIC POWER SCI & RES INST OF STATE GRID TIANJIN ELECTRIC POWER CO +3

Cabinet type device door lock system and control method thereof

ActiveCN102606008AEnsure safetyGuaranteed power-down stateNon-mechanical controlsElectricityElectromagnetic lock
The invention discloses a cabinet type device door lock system and a control method of the cabinet type device door lock system. The system comprises a logic unit, and a connecting rod type mechanical door lock, an electromagnetic lock and a sensor A, which are arranged on a cabinet type device door, wherein the electromagnetic lock, the sensor and voltage signals of a device in a cabinet are respectively in signal connection with the logic unit; a lock piece of the electromagnetic lock is matched with a fixing piece of a locking structure on a lock rod of the mechanical door lock, and the locking piece and the locking structure are matched to realize the locking to the mechanical door lock due to the electromagnetic lock at the position where the mechanical lock locks the cabinet type device door; the method is realized based on the cabinet type device door lock system, and the logic unit receives locking signals of the mechanical lock of the sensor A, sends electrifying signals to the device in the cabinet after receiving all door-closing signals and controls the locking of the electromagnetic lock; and when the device in the cabinet is in power down, the voltage signals of the device in the cabinet are transmitted to the logic unit, and the logic unit controls the unlocking of the electromagnetic lock. According to the invention, the power down of the device in the cabinet after the cabinet door is unlocked is ensured, and the safety of the maintenance personnel can be ensured.
Owner:SHENZHEN HOPEWIND ELECTRIC CO LTD

Security protection method and device for Android platform application and storage medium

The invention provides a security protection method and device for an Android platform application and a storage medium. The method comprises the following steps: an encryption step: decompiling an obtained apk, and encrypting the obtained apk to obtain an encrypted apk; a loading step: decrypting the encrypted apk in a customized system loading engine and then installing the encrypted apk; and arunning step: running the installed decrypted apk in a customized system running engine. According to the invention, resources are confused; encrypting the dex files respectively; so file, the resource file and the like are repackaged to obtain an encrypted apk; Safety is higher, the safety protection level of the application is improved. The released application does not contain a decryption code. The decryption code is written in a customized Android system. A cracker wants to crack the source program and must perform reverse analysis on the encrypted application and the customized Android system at the same time, so that the cracking difficulty is greatly increased, and meanwhile, as the program is decrypted by the customized Android system instead of self-decryption of the program, theoperation efficiency of the application is improved.
Owner:XIAMEN MEIYA PICO INFORMATION

Electromagnetic soft contact continuous casting crystallizer

ActiveCN102371348AGuaranteed electromagnetic permeabilityGuaranteed service lifeEngineering plasticEngineering
The invention relates to a kerf-valving external water-cooled type electromagnetic soft contact continuous casing crystallizer, comprising a kerf copper pipe (1), an upper-section inner water jacket (3), a lower-section inner water jacket (2), an electromagnetic induction coil (4), a shell (8), an upper flange (9) and a lower flange (10), wherein the shell (8), the upper flange (9) and the lower flange (10) constitute a crystallizer assembly structure; the upper-section inner water jacket is made of engineering plastics and is sleeved in the electromagnetic induction coil; a groove (12) is machined on the outer wall of the outer wall surface of the kerf copper pipe along each kerf (5); a high-temperature resisting insulation sheet (11) is inserted into each kerf; bonding glue (120) is coated and filled in the groove; the edge of the inserted tail end of the insulation sheet slightly protrudes out of the bottom plane of the groove; and the high-temperature resisting insulation sheets and the serf copper pipe are fixed by the binding glue. A top rib sealing bar (8) which aims at each kerf is arranged between the outer wall of the kerf copper pipe and the upper-section inner water jacket. The invention has the advantages of strong electromagnetic permeability and safe and reliable cooling water path.
Owner:BAOSHAN IRON & STEEL CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products