Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

95results about How to "Increase legitimacy" patented technology

Intelligent management and control system for unmanned aerial vehicle inspection

The invention discloses an intelligent management and control system for unmanned aerial vehicle routing inspection. The system comprises a flight data recording device, an unmanned aerial vehicle data cloud and an intelligent management and control platform. The flight data recording device is mounted on the unmanned aerial vehicle and is used for acquiring flight data and wirelessly sending theflight data to the unmanned aerial vehicle data cloud; the unmanned aerial vehicle data cloud is internally provided with a cloud memory, and the cloud memory is used for storing flight data of the unmanned aerial vehicle; and the intelligent management and control platform is in communication connection with the unmanned aerial vehicle data cloud end and is used for acquiring the flight data stored in the unmanned aerial vehicle data cloud end and carrying out analysis and calculation according to the flight data to form resources which can be directly accessed. According to the intelligent management and control system provided by the invention, the electric power inspection unmanned aerial vehicle can be comprehensively managed, the dynamic information of the unmanned aerial vehicle canbe monitored in real time, an operator can conveniently operate the unmanned aerial vehicle and timely find abnormity, and meanwhile, the use legality and safety of the unmanned aerial vehicle are enhanced.
Owner:云南电力试验研究院(集团)有限公司

Security protection method, equipment and system for data packet

The invention provides a method, a device and a system for protecting a data packet safely. The method comprises the following steps: receiving the data packet sent by an outside network; judging whether the time to life (TTL) value of the data packet is in a legal interval or not if characteristic data of the data packet exists in a network address translation (NAT) protocol mapping table; and releasing the data packet if the TTL value of the data packet is in the legal interval. By adopting the method, the reliability for the security judging result of the data packet can be enhanced.
Owner:HUAWEI DIGITAL TECH (CHENGDU) CO LTD

Method and system for preventing tampering with advertising content

The invention provides a method and system for preventing tampering with advertising content. The method includes the steps that first, an advertising server sends advertising data to a management server; second, the management server checks the legality of the advertising data; third, the management server encrypts the advertising data and generates encrypted advertising data, an advertising identification number and a decryption key; fourth, the management server sends the encrypted advertising data and the advertising identification number to the advertising server; fifth, the advertising server sends the encrypted advertising data and the advertising identification number to a terminal; sixth, the management server sends the advertising identification number and the decryption key to the terminal; seventh, the terminal checks the legality of the advertising data; eighth, the terminal decrypts the encrypted advertising data with the decryption key; ninth, the terminal displays the advertising data after successfully decrypting the advertising data. The method and system for preventing tampering with advertising content have the advantages of being capable of effectively preventing tampering with the advertising content and being high in safety performance.
Owner:SHANDONG TAIXIN ELECTRONICS CO LTD

Hamilton quantum arbitration signature and verification method based on quantum blind calculation

The invention discloses a Hamilton quantum arbitration signature and verification method based on quantum blind calculation, which comprises the following steps that a third communicator distributes aHamilton model to a first communicator and a second communicator; the first communicator prepares to-be-signed information represented by n quantum bit strings; the first communicator conducts quantum blind calculation on the to-be-signed information to obtain a measurement base; the first communicator signs the to-be-signed information by utilizing the Hamilton model; the second communicator conducts un-signing by utilizing the Hamilton model to obtain a verification quantum bit string; the third communicator verifies whether the first communicator is legal or not by verifying whether the to-be-signed information and the verification quantum bit string are the same or not; if legal, the second communicator uses the measurement base to measure the verification quantum bit string so as toobtain a measurement result; and the third communicator controls whether the measurement result is transposed or not according to the stored control parameters to obtain binary mode payment information. According to the Hamilton quantum arbitration signature and verification method based on quantum blind, the safety of the signature verification process is improved, and a verifier verifies the signature without the need for restoring the original information.
Owner:CENT SOUTH UNIV

Demodulation decoding integrated digital television broadcasting program safety authentication method

The present invention relates to a method for the safety certification of a digital television broadcasting program. At present, the safety certification to the program is mainly realized through the software configuration, and the security is low. The method of the present invention has the procedures that a preset legal program name is wrote in a ROM; a PST chart is abstracted, and the mapping of a program number of each program and the PID value of a PMT chart are established; a SDT chart is abstracted, and the mapping between the program number and the program name of each program; the corresponding program number of each legal program is detected; the PMT chart of the legal program is abstracted, and the audio and video PID value is decoded; a corresponding TS package of the legal program is identified, and then transmitted to the back level. The method of the present invention integrates a safety certification filter in a digital television demodulator and a decoder, while the legality of program information is checked, the cost is low, therefore ensuring that the TS stream of a flow message source decoder only contains legal contents already checked and passed.
Owner:HANGZHOU NATCHIP SCI & TECH

Overall traceable high-voltage electric energy meter calibrating device

PendingCN107748348AAvoid cumbersome connectionsAvoid cumbersomeElectrical testingTerminal voltageLow voltage
The invention discloses a high-voltage electric energy meter verification device that can be traced as a whole, mainly including a verification device control module and a three-phase standard power source; the verification device control module mainly includes an industrial computer, a user interface connected with the industrial computer, and a digital quantity Signal conversion board, pulse input and output board; the three-phase standard power source includes three single-phase standard power sources with the same structure and independent of each other, and the single-phase standard power source mainly includes a standard meter, a low-voltage signal source, a power amplifier, Current booster, booster, current transformer, voltage transformer, the output terminal of the current booster and the primary side of the current transformer form a current output loop, the secondary side of the current transformer is connected to the standard meter, the booster’s The output terminal is used as a voltage output terminal and is connected to the standard meter through a voltage transformer; the standard meter of each single-phase standard power meter is connected to the digital signal conversion board. The invention can verify the high-voltage electric energy meter as a whole, and the accuracy of the verification device can be traced as a whole.
Owner:HUAINAN POWER SUPPLY CO OF STATE GRID ANHUI ELECTRIC POWER CORPORATIO +2

A sample generation method and device

ActiveCN109598334ASmall training lossHigh legitimacy and diversitySoftware testing/debuggingNeural architecturesData entryNetwork model
The invention discloses a sample generation method and device. The method comprises the steps: inputting data in a pre-collected training set into a neural network model, obtaining a sample generationmodel, and enabling the neural network model to be a neural network model employing an attention mechanism; Inputting pre-collected data in the test set into the sample generation model to generate asample. According to the invention, a neural network model of an attention mechanism is adopted; the neural network model can endow characters in the input data with different weights; Therefore, data information in the input data can be learned more selectively, data with high correlation with the current output data in the input data can be found, a high-precision deep learning model can be finally obtained, training loss is low, and samples generated by the high-precision deep learning model are inevitably higher in legality and diversity.
Owner:CHINA INFORMATION TECH SECURITY EVALUATION CENT

Information witness method and device

The invention discloses an information witness method and device. The method specifically includes the following steps: enabling an information witness platform to receive an information witness request; selecting a target witness server for information to be witnessed carried in the information witness request from all witness servers that are registered in advance; witnessing the information tobe witnessed through the target witness server to obtain a witness result; and storing the witness result in a witness blockchain. Even if multiple information to be witnessed exists, users do not need to witness the information at different witness servers respectively, the operation of automatically selecting the target witness server can be triggered through the mode of initiating the information witness request, user operations can be reduced, the witness process can be simplified, and the witness efficiency and user experience can be improved; and in addition, the witness result is storedin the witness blockchain, and thus the witness result cannot be easily tampered with, the accuracy and legitimacy of the witness result can be ensured, and moreover, even if the witness servers areattacked, the witness result stored in the witness blockchain cannot be leaked, and the information security can be improved.
Owner:BEIJING 21VIANET DATA CENT +1

Power distribution room safety monitoring system based on infrared sensing

The invention relates to a power distribution room safety monitoring system based on infrared sensing. The system comprises a monitoring terminal, a center server and a pre-warning device. The monitoring terminal comprises an infrared sensor, a radio frequency signal reader and a microcomputer control device; the infrared sensor is used for detecting whether a person enters a power distribution room and transmitting detected infrared information to the microcomputer control device; the radio frequency signal reader is provided with a transmitting antenna and is used for detecting whether a recognizable tag exists in a work area and transmitting collected tag information to the microcomputer control device; the microcomputer control device is used for receiving information sent by the infrared sensor and the radio frequency signal reader and transmitting the information to the center server. The center server is used for receiving the information sent by the monitoring terminal, judging whether the person entering the power distribution room is authorized and carrying out related operations according to the judgment result. The pre-warning device is used for sending out prewarning information once triggered by the center server when an unauthorized person enters the power distribution room. The system can automatically monitor validity of the person entering the power distribution room and safety of the power distribution room is improved.
Owner:STATE GRID CORP OF CHINA +2

Fuzzy test method and system for stateful network protocol

The invention belongs to the technical field of network space security testing, and particularly relates to a stateful network protocol-oriented fuzzy testing method and system.The stateful network protocol-oriented fuzzy testing method comprises the steps of extracting protocol rules from grammar and semantic dimensions according to protocol format specifications to be tested, and constructing a rule set; generating a message test template by using rules in the rule set, and marking variation operation related fields in the message test template by using a message label; analyzing the message test template and executing a corresponding mutation operation according to the message label to obtain a test message for finishing a fuzzy test by guiding the state transition of the protocol to be tested; and sending the test message to the to-be-tested protocol target program, and performing state abnormity judgment in the fuzzy test according to the reply message state. According to the method and the device, the legality of the test message can be improved, the condition of program verification failure caused by variation of special fields is avoided, the test message can be used for testing and can also be used for replacing an auxiliary message to guide protocol state transition, the test efficiency is improved, and system resources are saved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Vehicle-road cooperative management method, MEC server, terminal and system

The embodiment of the invention provides a vehicle-road cooperative management method, an MEC server, a terminal and a system, relates to the field of intelligent transportation, and aims to avoid information leakage caused by access of an illegal terminal to a vehicle-road cooperative management system and enhance the safety of the vehicle-road cooperative management system. The method comprisesthe steps that a terminal acquires data information, wherein the data information comprises signature information, traffic information and attribute information of the terminal, the traffic information is used for indicating road conditions related to the terminal, the signature information is used for verifying the legality of the terminal, and the attribute information is used for indicating thetype of the terminal; the terminal sends the data information to an MEC server; the MEC server receives the data information sent by the terminal; the MEC server judges whether the terminal is legalor not according to the signature information; if the terminal is legal, the MEC server determines a traffic optimization strategy according to the traffic information; and the terminal receives the traffic optimization strategy sent by the MEC server. The method is used for optimizing the intelligent traffic.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Data operating method and device for intelligent card

The embodiment of the invention discloses a data operating method for an intelligent card, which is characterized in that a network side utilizes a set safe calculating algorithm and a secret key to calculate the information identifying data of data operating relevant information after determining that data access operation is needed for an intelligent card, and a data operating command carrying the information identifying data and the data operating relevant information is sent to the intelligent card; the intelligent card reads the secret key saved therein after receiving the data operatingcommand and then utilizes the safe calculating algorithm and the read secret key to calculate the information identifying data of the data operating relevant information, if the calculated informationidentifying data is consistent with the information identifying data carried in the data operating command, the data access operation is performed on the intelligent card, and otherwise, the data access operation is refused to the intelligent card. The embodiment of the invention also discloses an intelligent card. By adopting the invention, the safety and the validity of the data access operation performed on the intelligent card can be effectively improved.
Owner:BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products